Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Walden University Walden University
ScholarWorks ScholarWorks
Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection
2020
Reducing the Frequency and Effects of Fraudulent Activities in Reducing the Frequency and Effects of Fraudulent Activities in
Community Action Agencies Community Action Agencies
Marvin L J Blye Walden University
Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations
Part of the Accounting Commons
This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected].
Walden University
College of Management and Technology
This is to certify that the doctoral study by
Marvin L. J. Blye
has been found to be complete and satisfactory in all respects,
and that any and all revisions required by
the review committee have been made.
Review Committee
Dr. Dina Samora, Committee Chairperson, Doctor of Business Administration Faculty
Dr. Lisa Cave, Committee Member, Doctor of Business Administration Faculty
Dr. Deborah Nattress, University Reviewer, Doctor of Business Administration Faculty
Chief Academic Officer and Provost
Sue Subocz, Ph.D.
Walden University
2020
Abstract
Reducing the Frequency and Effects of Fraudulent Activities in Community Action
Agencies
by
Marvin L. J. Blye
MBA, Wilmington University, 1993
BS, University of Maryland Eastern Shore, 1988
Doctoral Study Submitted in Partial Fulfillment
of the Requirements for the Degree of
Doctor of Business Administration
Walden University
November 2020
Abstract
In the United States, nonprofit organization leaders estimate that $40 billion of revenue is
lost every year because of financial scandals and fraudulent activities. Fraud negatively
affects organizational functioning, service delivery, and board governance. Nonprofit
leaders who fail to prevent fraud increase the chance of their organization’s failure.
Grounded in Cressey’s fraud triangle theory, the purpose of this qualitative multiple case
study was to explore strategies nonprofit community action agency (CAA) executive
leaders use to reduce fraudulent financial activities. The participants comprised 5
executive CAA nonprofit leaders located in Maryland who effectively used strategies to
reduce fraudulent financial behaviors in their organizations. Data were collected from
semistructured interviews, analysis of organizations’ internal documents, and official
documentation review. Yin’s 5-stage analysis was used to analyze the data. Three themes
emerged: ethics and regulatory compliance, transformational leadership, and managerial
skills. A key recommendation is for CAA executive nonprofit leaders to foster
individualized consideration by mentoring leaders to comply with ethics and regulatory
compliances and incorporate strategies to mitigating fraudulent behaviors, which
increases organization performance, stakeholders’ motivation, and organization
sustainability. The implications for positive social change include the potential to
increase donors’ contributions and promote social programs and activities such as Head
Start, tax return preparations, and adult and children’s literacy in the local communities.
Reducing the Frequency and Effects of Fraudulent Activities in Community Action
Agencies
by
Marvin L. J. Blye
MBA, Wilmington University, 1993
BS, University of Maryland Eastern Shore, 1988
Doctoral Study Submitted in Partial Fulfillment
of the Requirements for the Degree of
Doctor of Business Administration
Walden University
November 2020
Dedication
This study is with honorable memory and dedication to my father and mother,
Joseph and Annabell Blye, the blessings that God chose to deliver and present me to this
world. My parents were God’s vision and purpose to fulfill His pathway for my life’s
process. I hope that my journey and life’s story is motivating and gives others the dream
to pursue their goals. I am grateful to God, His preserving my life, and blessed to have
reached this amazing accomplishment and success. My parents’ spirits are driving my life
and providing me the strength to always be thankful and reach beyond my present state. I
miss and love you both so much.
Acknowledgments
I would like to thank my heavenly Father (God) the great I Am for His infinite
grace and mercies as He favored me and provided the knowledge, wisdom, guidance, and
resources during this journey. In addition, I would like to thank my phenomenal Chair,
Dr. Dina Samora (Dr. D), my committee Dr. Lisa Cave, Dr. Deborah Nattress, and Dr.
Susan Davis for your leadership, guidance, and recommendations during my educational
journey. Dr. Kevin James, Dr. Desire Luamba, and Dr. Edward Boachie, thank you all for
your extra motivation, support, and efforts to keep me from jumping off the educational
ledge. I am grateful to and for you all.
To my wife, Nafisah, and siblings: Louise, Shirley, Sam, Mary, Jacqueline,
Louester, Teresa, Terry, Simon, Wanda, Curtis, my in-laws: Emmanuel and Maria,
Justina, Rose, Florence, Grace, Miranda, Margaret, Elizabeth, Michael, thank you for
your prayers, encouragement, and motivation. I will continue to make you all proud. I
thank God for each of you and love you all.
To my mentors, Mr. Freddy Mitchell, Dr. Tyrone Chase, Dr. Kirkland Hall, and
Dean Tilghman, you saw things in me that I could not see in myself. Thank you for
providing me with the chance to pursue my dreams, education, and career. I appreciated
you sharing your wisdom, vision, faith, and the sharing of your leadership and life’s
knowledge with me. You will forever be in my prayers and a part of my heart to serve
others.
To my best bud Steve Lorick, Sr., brothers and sisters in Christ, friends, Kappa
brothers, and supporters thank you for your prayers, patience, and understanding. You
were my spiritual strength during this journey. God blessed me with the opportunity to be
a brother, uncle, friend, inspiration, and role model for you. As you live, give yourself the
dream to pursue your achievements. I love you all.
i
Table of Contents
List of Tables ..................................................................................................................... iv
Section 1: Foundation of the Study ......................................................................................1
Background of the Problem ...........................................................................................1
Problem Statement .........................................................................................................2
Purpose Statement ..........................................................................................................2
Nature of the Study ........................................................................................................3
Research Question .........................................................................................................4
Interview Questions .......................................................................................................4
Conceptual Framework ..................................................................................................5
Operational Definitions ..................................................................................................6
Assumptions, Limitations, and Delimitations ................................................................7
Assumptions ............................................................................................................ 7
Limitations .............................................................................................................. 7
Delimitations ........................................................................................................... 8
Significance of the Study ...............................................................................................9
Contribution to Business Practice ........................................................................... 9
Implications for Social Change ............................................................................... 9
A Review of the Professional and Academic Literature ..............................................10
Organization of the Review .................................................................................. 11
Search Strategy ..................................................................................................... 11
Summary of Peer-Reviewed Articles .................................................................... 12
ii
Application to the Applied Business Problem ...................................................... 12
Community Action Agencies History and Conceptual Framework ..................... 13
Community Action Agencies Programs ............................................................... 14
Critical Analysis of Fraud Triangle Theory .......................................................... 17
Contrasting Theory of Ethical Concept ................................................................ 24
Analysis of Fraud in Workplaces .......................................................................... 27
Fraud in Profit Organizations................................................................................ 33
Fraud in Nonprofit Organizations ......................................................................... 41
Transition .....................................................................................................................48
Section 2: The Project ........................................................................................................50
Purpose Statement ........................................................................................................50
Role of the Researcher .................................................................................................50
Participants ...................................................................................................................52
Research Method and Design ......................................................................................53
Research Method .................................................................................................. 53
Research Design.................................................................................................... 54
Population and Sampling .............................................................................................55
Ethical Research...........................................................................................................57
Data Collection Instruments ........................................................................................58
Data Collection Technique ..........................................................................................61
Data Organization Technique ......................................................................................63
Data Analysis ...............................................................................................................64
iii
Reliability and Validity ................................................................................................66
Reliability .............................................................................................................. 66
Validity ................................................................................................................. 67
Transition and Summary ..............................................................................................69
Section 3: Application to Professional Practice and Implications for Change ..................70
Introduction ..................................................................................................................70
Presentation of the Findings.........................................................................................71
Theme 1: Ethics and Regulatory Compliance ...................................................... 74
Theme 2: Transformational Leadership Style....................................................... 78
Theme 3: Managerial Skills .................................................................................. 82
Applications to Professional Practice ..........................................................................86
Implications for Social Change ....................................................................................87
Recommendations for Action ......................................................................................88
Recommendations for Further Research ......................................................................90
Reflections ...................................................................................................................91
Conclusion ...................................................................................................................92
References ..........................................................................................................................94
Appendix A: Interview Protocol ......................................................................................132
Appendix B: Interview Questions ....................................................................................133
iv
List of Tables
Table 1. Details of References Used in the Literature Review ..........................................12
Table 2. Ethics and Regulations Compliance ....................................................................78
Table 3. Transformational Leadership Style ......................................................................81
Table 4. Managerial Skills .................................................................................................85
1
Section 1: Foundation of the Study
Reducing or mitigating fraud is essential to promote the longevity of an
organization (Ge, Koester, & McVay, 2017). A regular audit or control of accounting and
financial activities can influence an organization’s growth or performance for a long-term
activity (Gordian & Evers, 2017). The effectiveness of controllers or auditors in an
organization is a critical factor that managers can rely on to meet the company’s goals
and accomplish the mission statement of the organization (Ge et al., 2017). In nonprofit
organizations, the role of managers should also be meeting and performing services or
goods to increase customers’ satisfaction or donors’ contributions to promote the
business. But fraud negatively affects business performance. Integrating the concepts of
the fraud triangle may contribute to increase transparency and provide solutions to
mitigate fraud. Exploring and analyzing the impacts of fraud in nonprofit organizations
could lead to improvements in the relationship between nonprofit managers, government
agencies leaders, and private or official contributors.
Background of the Problem
Nonprofit business scandals and fraudulent acts of leaders motivated by perceived
perception and actual economic conditions have negatively affected organizational
functioning, services delivery, and board governance (Zona, Minoja, & Coda, 2013). In a
2016 survey, the Association of Certified Fraud Examiners (ACFE) Report to the Nations
on Occupational Fraud and Abuse estimated that nonprofit organizations account for 10%
of all occupational fraud cases every year to fraudulent financial acts, with an average
cost per incident of $100,000 (ACFE, 2016). Skimming cash, purchasing schemes, and
2
financial statement fraud are types of fraud that nonprofit managers must detect and
prevent to secure the organization’s assets (Zack & DeArmond, 2015). From 2008 to
2012, over 1,000 nonprofit organizations’ leaders in the United States discovered a
significant diversion of assets attributed to theft, investment fraud, embezzlement, and
other unauthorized uses of funds (Stephens & Flaherty, 2013). Further, covering up a
fraud in nonprofit organizations is a crime that may lead to losing millions of dollars in
future donations to support organizations’ activities (Stephens & Flaherty, 2013). In my
study, I explored strategies to reduce fraudulent financial activities in nonprofit
community action agencies.
Problem Statement
Nonprofit business scandals and fraudulent acts by leaders negatively affect
organizational functioning, services delivery, and board governance (Zona, Minoja, &
Coda, 2013). Nonprofit organization fraud cases increased by 20% in the United States
from 2010 to 2015, which amounted to about $40 billion of loss each year (Kummer,
Singh, & Best, 2015). The general business problem was nonprofit leaders who commit
fraudulent financial activities affect organizational sustainability. The specific business
problem was some nonprofit community action agency (CAA) executive leaders lack
strategies to reduce fraudulent financial activities.
Purpose Statement
The purpose of this qualitative multiple case study was to explore the strategies
that some nonprofit CAA executive leaders use to reduce fraudulent financial activities.
The population for this study included executive leaders of four nonprofit community
3
action agencies in Maryland who have implemented strategies that have successfully
reduced fraudulent financial activities. The contributions to social change are aiding
executive leaders in developing processes and procedures that advocate for better policies
and providing strategies to reduce fraudulent financial activities, promote corporate
responsibility, and influence the performance and positive outcomes of programs. The
contributions for social change can support the success of programs such as Head Start,
tax preparation, and adults’ and children’s education in local communities.
Nature of the Study
I used the qualitative method for this study. The qualitative method is the
systematic inquiry into a social phenomenon enabling researchers to focus on events and
outcomes of those events from the perspective of those involved (Dasgupta, 2015;
Teherani, Martimianakis, Stenfors-Hayes, Wadhwa, & Varpio, 2015). The qualitative
method was appropriate because the purpose of this study was to explore the strategies
that leaders in nonprofit CAAs use to reduce fraudulent financial activities. Using the
quantitative method involves hypotheses testing, and the mixed method involves aspects
of the qualitative and quantitative methodology (Dasgupta, 2015; Kruth, 2015). I did not
test hypotheses; therefore, neither the quantitative nor the mixed method was appropriate
for this study.
In qualitative studies, researchers use case study, phenomenology, narrative, or
ethnography. Researchers use a case study design to understand a real-world case when
the phenomenon and the context are not evident (Yin, 2017). I selected the multiple case
study design to explore strategies that nonprofit CAA executive leaders used to reduce
4
fraudulent financial activities. Researchers use a multiple case study design to explore
experiences using a qualitative methodology to get an in-depth understanding of
phenomena (Khan, 2014). In contrast, researchers use phenomenology to seek and
understand participants lived social experiences (Bevan, 2014). Narrative researchers
elicit participants’ stories of phenomena, and in an ethnography design, researchers
explore the language, beliefs, and behaviors of participants (Paschen & Ison, 2014). I did
not elicit stories, explore cultural group, or explore lived experiences of participants;
therefore, narratives, ethnography, and phenomenology were not appropriate for this
study.
Research Question
What strategies do nonprofit CAA executive leaders use to reduce fraudulent
financial activities?
Interview Questions
1. What strategies have you used to reduce fraudulent financial activities in your
organization?
2. How do you determine if your strategies used to reduce fraudulent financial
activities are working?
3. What strategies were the least effective to reduce fraudulent financial activities?
4. What, if any, strategies do you use to circumvent the pressure to commit a crime
in your organization?
5. What, if any, strategies do you use to circumvent the opportunity to commit a
crime in your organization?
5
6. What, if any, strategies do you use to circumvent the rationalization to commit a
crime in your organization?
7. What other information can you add about your strategies to reduce fraudulent
financial activities?
Conceptual Framework
The conceptual framework for this study is the fraud triangle. Cressey (1953)
developed the fraud triangle in 1950 as an approach to understand the unethical behaviors
of individuals who commit fraudulent crimes. The key tenets of the fraud triangle consist
of opportunity, pressure, and rationalization (Cressey, 1953). Most individuals require
some form of pressure to commit a criminal act.
Murphy and Dacin (2011) further expanded Cressey’s fraud triangle, confirming
that the characteristics of opportunity, attitude, and individual rationalization are likely
predictors of fraudulent financial acts. Companies that focus on preventing the key
factors that enable fraud may mitigate the creation of a fraud culture. Universally,
unethical acts of individuals occur when all three elements of the triangle exist (Albrecht,
Turnbull, Zhang, & Skousen, 2010). Consequently, I expected that the framework from
Cressey and the expanded theory from Murphy and Dacin were a reasonable foundation
for understanding strategies that some nonprofit CAA executive leaders use to reduce
fraudulent financial activities. The fraud triangle was the foundation for the development
of the research protocol.
6
Operational Definitions
Community action agencies (CAAs): Nonprofit private and public organizations
established under the Economic Opportunity Act of 1964 to fight America’s War on
Poverty (National Association for State Community Action Programs, 2014).
Ethical deficiency: The inability to distinguish between acceptable and
unacceptable behaviors that mitigate and thwart fraudulent activities (Harriss &
Atkinson, 2015).
Fraudulent financial activity: The ability to defraud individuals through false
presentations of financial data in reports that misrepresent facts (Internal Revenue
Service [IRS], 2015).
Occupational fraud and abuse: The use of one’s occupation for personal
enrichment through the deliberate misuse and misappropriation of organizational
resources and assets (ACFE, 2016).
Perceived opportunity: The weakness and ability to exploit a situation to one’s
advantage (Abdullahi & Mansor, 2015).
Perceived pressure: The motivation that leads to committing unethical behaviors
(Abdullahi & Mansor, 2015).
Perceived rationalization: The attempt to explain and justify a behavior with
logical reasoning (Abdullahi & Mansor, 2015).
7
Assumptions, Limitations, and Delimitations
Assumptions
Assumptions are statements that researchers presume to be accurate, often only
temporarily or for a specific purpose, such as building a theory (Parker, 2014). I assumed
that fraud prevails in the nonprofit sector of America and that ethical behavior could
prevent or limit fraud in organizations. Another assumption I made was that leaders of
CAAs will report their strategies within their organizations that reduced fraudulent
financial behaviors and activities within their CAA. I also explored fraudulent financial
activities in CAAs with the assumption that the tenets of the fraud triangle theory could
mitigate the behaviors of the participants in the organizations. Further, I assumed the
participants had the knowledge to answer the research questions in an open, honest, and
candid manner. I also assumed that the participants of the study would be executive
leaders with the interest of adding to the body of knowledge of strategies that reduced
fraudulent financial activities.
Limitations
Researchers limit their studies for internal and external validity of the research
(Holloway & Galvin, 2017). Limitations are matters and occurrences that arise in a study
beyond the researcher’s control (Yin, 2017). Limitations and generalizations can affect
the results and can affect the conclusions of the study. A limitation also refers to limiting
conditions or restrictive weaknesses in a study (Locke, Spirduso, & Silverman, 2016).
This study included three principal limitations. The first limitation was the number of
interview participants in the study that could provide a lack of perspectives on the topic
8
of fraudulent financial activities. The second limitation was the design of the case study
selected to conduct the study, as the outcomes can be predictable (Yin, 2017). The third
limitation was the conducting of interviews with participants with the responsibility of
organizational administration and the implementation of internal control measures to
provide strategies to reduce fraudulent financial activities in CAAs. Finally, the findings
of this study might not be interchangeable to other states of CAAs and might contribute
to reduce fraudulent financial activities.
Delimitations
Delimitations of a study are factors that arise from limitations in the scope of the
study and by the conscious exclusion and inclusion of decisions made during the
development of the study (Marshall & Rossman, 2016; Simon & Goes, 2013).
Delimitations are generalizations of populations and define the limits inherent in a study
(Locke et al., 2016). Delimitations of the study are (a) the problem of the study, (b) study
location, and (c) sample population. I elected to explore the strategies of nonprofit CAAs
use to reduce fraudulent financial activities. The qualitative multiple case study was
focused on the leaders of nonprofit CAAs regarding employing strategies to reduce
fraudulent financial activities. The study location was limited to Maryland and was not
generalized to other CAAs in other states. The study population was limited to the leaders
of the CAAs and the scope of information to explore strategies to reduce fraudulent
financial activities.
9
Significance of the Study
In this qualitative multiple case study, I focused on the exploration of strategies
that executive leaders used to reduce the frequency and effects of fraudulent financial
activities in nonprofit community action agencies. The results of this study could help
leaders understand how to prevent or mitigate fraudulent financial activities and employ
managerial control systems to benefit the sustainability of businesses or nonprofit
organizations and the communities in which they serve.
Contribution to Business Practice
Business leaders can provide leaders with strategies to prevent fraudulent
financial activities. In addition, other nonprofit organizations may incorporate shared
strategies to prevent or mitigate the effects of fraudulent financial activities. Additionally,
executive leaders might have the ability to implement business strategies of internal
controls, systems changes, and checks and balances in operations that provide oversight
and enhancement of service deliverables while avoiding the loss of reputation and
derivative reductions in profits from fraudulent activities.
Implications for Social Change
The implications of social change from the results of this study include helping
other nonprofit executive leaders in developing processes and procedures that advocate
for better policies, strategies to reduce fraudulent financial activities, promoting corporate
responsibility, and influencing the performance and positive outcomes of business
activities. The results may also help affect the success of programs such as Head Start,
tax returns preparation, adults’ and children’s education in local communities, and other
10
services on which citizens in need depend. Leaders who catalyze the development and
sustainability of educational programs promote employees, families, and community
members’ satisfaction (Lueg & Radlach, 2016).
A Review of the Professional and Academic Literature
Researchers conduct literature reviews using multiple sources to show evidence
about the topic and the research question. The literature review is an in-depth analysis
that reveals what previous analysts argued about the topic and gives new ideas to
approach the current business problem (Baker, 2016; Winchester & Salji, 2016). The
effects of fraud and crime in nonprofit organizations are damaging to organizational
programs (Adelstein & Clegg, 2016). Failure to implement fraud mitigation strategies
and internal control measures may contribute to organizational failure or collapse. It is
critical for nonprofit leaders to understand the effects of fraud and its risk to
organizational programs (Haas, Van Craen, Skogan, & Fleitas, 2015; Rendon & Rendon,
2015). Some authors have argued that the opportunity for a person or people to commit
fraud results in a lack of supervision or internal controls of a company (Astuti,
Zuhrohtun, & Kusharyanti, 2015; Rasha & Andrew, 2012; Schuchter & Levi, 2016).
Thus, finding appropriate strategies to mitigate fraud in nonprofit organizations would
help nonprofit leaders to increase performance. The fraud triangle theory was a useful
framework for organization managers to analyze vulnerability, detect financial fraud, and
mitigate unethical behaviors (Cressey, 1950; Harrison, 2018; Kassem & Higson, 2012).
The integration of other academic sources into the fraud triangle theory was necessary to
manage, analyze, and mitigate fraud.
11
Researchers should identify themes and subthemes to reveal what other scholars
explored to give new ideas to resolve the current business problem (Callahan, 2014). In
the following literature review, I examined the use of the fraud triangle theory as a
primary conceptual framework to mitigate fraud and promote productivity. Additional
analysis included a synthesis of the contrasting theory of ethical concepts, organizational
leader’s strategies to mitigate fraud and the implementation of control measures to
prevent misconduct practices in nonprofit organizations.
Organization of the Review
The content outlined in the literature review is valuable for exploring strategies
nonprofit CAA leaders used to understand the effects of fraud on business performance,
increase transparency, and mitigate fraud in their organizations. The literature review is
organized around search strategies, the percentage of articles used, applications to the
business problem, and analysis of Cressey’s fraud triangle theory. The literature also
provides an overview of the contrasting theory of ethical concepts that some nonprofit
community action leaders have used as strategies to reduce fraudulent financial activities.
Search Strategy
I used a variety of sources to research the topics of interest. The information in the
literature review started with an identification of peer-reviewed articles, journals,
dissertations, books, and internet resources relevant to the topic of this study. I explored
resources directly from organizations such as the Association of Fraud Examiners, U.S.
non-governmental organizations, and the CAAs’ archives and records system. I also used
the Google Scholar search engine and the Walden University library online system. The
12
Walden University library online system was the primary source of the literature review,
using keyword searches in the following databases: (a) Business source complete (b)
ProQuest, (c) SAGE, and (d) Science direct. I used the following keywords to identify
my sources: Fraud triangle theory, ethical theory, nonprofits, crime, sustainability, board
governance, strategies and controls, and corporate social responsibility.
Summary of Peer-Reviewed Articles
The literature review included an analysis and synthesis of Cressey’s (1950) fraud
triangle theory. As required by Walden University, I used Ulrich’s Periodical Directory to
verify scholar peer-reviewed journal articles and ensure the reliability of sources (Walden
University, 2016). The literature review had 176 sources, which includes 95% (167) peer-
reviewed articles. The total of my sources represented 85% of articles within 2015 and
2020. Table 1 includes the details of references explored in the literature review.
Table 1
Details of References Used in the Literature Review
Reference Percentage Total
Peer-reviewed articles 95% 167
Not peer-reviewed 5% 9
Less than 5 years (2015-2020) 85% 149
More than 5 Years (< 2015) 15% 27
Application to the Applied Business Problem
The purpose of this qualitative multiple case study was to explore strategies that
some nonprofit community agency executive leaders used to reduce fraudulent financial
activities. Nonprofit business scandals and fraudulent acts negatively affect
organizations’ reputation, success, and may lead to a tremendous financial crisis (Zona et
13
al., 2013). My analysis and synthesis of the literature review outlined Cressey’s (1953)
fraud triangle theory as a strategic response to financial fraud in nonprofit community
action agencies, managerial control systems, sustainability, and corporate social
responsibilities of nonprofit organizations.
Community Action Agencies History and Conceptual Framework
In the United States, the assassination of President John F. Kennedy sparked
legislation to address the war on poverty through the Economic Opportunity Act of 1964.
President Lyndon B. Johnson, through legislation, tried to settle the nation and regain
public trust. President Johnson, through the 1964 act, established training, educational,
and service programs for communities and job corps throughout the country to reduce
poverty and improve life in the community (Brauer, 1982). The 1964 act was critical and
led to the creation of the Community Action Program that oversees the local CAAs in the
United States and its territories for the welfare of the local communities.
Managers in the CAAs help to fight poverty by empowering poor Americans
through programs to counter poverty. CAAs’ contributions to sustainable programs
directly correlate to organizational leaders and their implementation of internal controls
to mitigate fraud (Goetz, 2017). CAA leaders in their strengthening of program
compliance, fiscal, operational accountabilities, board governance and oversight, and
processes help to identify fraudulent behaviors and implement organizational controls
that thwart fraud within agencies. For my study, I used Cressey’s (1953) fraud triangle
theory to explore the role of the Head Start, and tax programs, strategies leaders in
community action agencies may use to reduce fraudulent acts in nonprofit organizations.
14
Cressey’s fraud triangle theory was the lens to understand the pressure, opportunities, and
rationalization for nonprofit agents to commit fraud.
Community Action Agencies Programs
Head Start program. The Head Start program is a nonprofit organization that
serves children from birth to 3 years in response to research evidence highlighting that
the first years of a child’s life are essential to their long-term growth and brain
development. The role of the Head Start program is to prepare children with the basics of
social and emotional development, cognition, language and literacy, language and
communication, mathematics development, and scientific reasoning (McClelland &
Cameron, 2019). The Head Start program is among the most significant educational
nonprofit organizational structures that prepare children to enter school. The Head Start
program is a multibillion-dollar nonprofit organization that serves over 899,000 children
and families throughout the United Nations (Head Start Information, 2017). Head Start
programs are significantly contributing to good children’s educational systems.
Promoting earlier children’s education development is critical to motivate youth
to engage in school and increase knowledge. Based on research on determinants and
implications for adverse linear cognitive development growth outcomes in adolescence
from low- and middle-income countries in their early years, psychosocial development
among preschool children’s outcomes need additional educational resources and
programs to catch up in their later years (Desmond & Casale, 2017). Programs within
CAAs must have the curriculum components that address cognitive-developmental
learning for children and collect enough financial means to provide early learners with a
15
good education (Schonert-Recihi et al., 2015). CAA leaders must synchronize with the
school systems for children's education and promote a positive social change (Tefera,
2018). Leaders of CAAs must promote trust among stakeholders in the program by
having competent managers and improving positive behaviors to provide comprehensive
resources for the benefit of children’s educational programs.
Tax program. Understanding and complying with tax regulations may be
challenging for individuals and business managers (Bird & Davis-Nozemack, 2018). But
nonprofit organization leaders can assist people to comply with government regulations
(Siliunas, Small, & Wallerstein, 2019). For tax assistance, CAAs leaders have
implemented Volunteer Income Tax Assistance to offer free income tax preparation to
people who make annual revenue less than $56,000, people with disabilities, limited
English speakers, and refugees who need assistance (Head Start Information, 2017). For
businesses, managers must promote their activities in complying with federal and state
tax regulations (Goss, Barnes, & Rose, 2019). Taxes collected and paid timely and
equitably by business managers constitute a principal source of revenue for the
government and contribute to social projects such as roads, schools, hospitals, salaries of
government employees, and social security (Akcura, 2015; Kioko & Zhang, 2019).
Therefore, complying with tax regulation is one of the most important regulations that
may determine the efficiency and longevity of any organization (Jiang, Aldewereld,
Dignum, Wang, & Baida, 2015; Madura, 2015).
There are two different groups of taxes: direct and indirect (Davis, Guenther,
Krull, & Williams, 2015). Direct taxes are taxes that the government directly collects
16
through individuals and organizations, and indirect taxes are taxes that some intermediary
agencies collect on goods or services sold for the government (Davis et al., 2015). For
example, taxes from import and export of goods and services are indirect taxes and
constitute another vital source of government revenue (Zhuk, 2018).
Further, one of the tax regulations for nonprofit organizations requires the
submission of the annual 990 tax returns forms before April 15 of each year to avoid late
filing fees (Hopper, 2017; Svensson & Moorman, 2019). Based on the Statement of
Financial Accounting Standards No. 116 on nonprofit organizations’ performance,
nonprofit organization leaders should recognize and report organizational assets and
revenues annually through their 990-tax return reporting to increase the confidence of
stakeholders (Archambeault, Webber, & Greenlee, 2015). Thus, it is critical for both
profit and nonprofit business leaders to recruit individuals who have tax skills and
business experience to mitigate management risk of noncompliance (Cabral, Mahoney,
McGahan, & Potoski, 2019). However, future research is needed about the implication of
taxes in business profitability or productivity in the current business context affected by
the multiple effects of globalization.
Based on the fraud triangle theory, individuals and organizations must declare,
report, and pay their taxes fairly to avoid penalization. Complying with tax policies
contributes to prevent actions like penalization by government and fraud by employees or
managers (Oishi, Kushlev, & Schimmack, 2018). Further, complying with federal and
state tax regulations, reporting requirements, and policies are crucial strategies for
nonprofit organizations managers to reach their mission and goals with success (Okpeyo,
17
Musah, & Gakpetor, 2019). As stated by Cressey (1953), the effects of fraud may have a
positive or negative effect on the business or social environment. The lack of punishment
to tax fraudsters ruin the values of our culture in the communities (Okpeyo et al., 2019),
but fraudsters have developed new strategies to operate online or using electronic devices
to overcome the laws (Black, Christensen, Kiosse & Steffen, 2017; Celik, 2016).
Therefore, promoting business expansion and profit, nonprofit managers together with
government leaders must promote ethical values at all levels of organization structures
(Yeh & Chen, 2019). It is also the federal and state government’s mission to punish fraud
activists as an example of good morality and ethics.
Critical Analysis of Fraud Triangle Theory
In 1950, Cressey defined the fraud triangle theory as a framework designed to
explain the reasons why employees commit fraud in organizations. The key tenets of the
fraud triangle consist of opportunity, pressure, and rationalization (Cressey, 1953). The
first factor in the fraud triangle theory is the pressure related to the motivation that leads
to acting unethically (Abdullahi & Mansor, 2015). Every fraud perpetrator faces some
burden to commit unethical behavior for many reasons (Mansor, 2015). For example,
ethical knowledge can moderate the relationship between pressure and organizational
fraud because ethics has a direct and indirect influence on work engagement and
organizational misbehavior (Mansor, 2015). Individuals usually rationalize their
decisions to behave fraudulently or unethically by using terminology that expresses
different ethical theories such as utilitarianism (Abdullahi & Mansor, 2015). In a similar
view, the concept of rationalization, which is the third element of the fraud triangle, leads
18
to unethical behavior (Kassem & Higson, 2012). Rationalization is the validation of
unethical behavior and may lead to criminal activity (Kassem & Higson, 2012). If an
individual cannot justify immoral actions, it is unlikely that he or she will engage in fraud
(Abdullahi & Mansor, 2015; Greenwood, 2016).
Because of the complexity of fraud phenomenon, some scholar analysts have
different views about fraud conception (Free, 2015). For example, Svatos (2017) defined
fraud as a criminal act that affects the entire community. Poor management controls and
regulations may encourage individuals to engage in fraud by misstating financial
transactions, which can derail most administrations (Abdullahi & Mansor, 2015; Astuti,
Zuhrohtun, & Kusharyanti, 2015; Carver, Klein, & Gistinger, 2015; Sorunke, 2016).
Previous researchers have also explained the act of providing intentionally false
information to stakeholders in the organization as a deceitful or fraudulent behavior and
encouraged managers to increase transparency and audits (Church, Jenkins, & Stanley,
2018; Houlbrook, 2011; Karcz & Papadakos, 2011). Much work remains to analyze and
understand the true nature of fraud in profit and nonprofit organizations (Mukherjee,
2016).
Additionally, individuals may commit fraud at any time and in any organization.
The relationships and transactions in the marketplace should be equitable, just, and fair;
nevertheless, several individuals and businesses have violated these traits leading to
immoral behaviors (Komarova Loureiro et al., 2016). Though fraud is harmful to
business performance, fraud has become a significant business activity in the current
business environment (Free & Murphy, 2015). Researchers have noted that one of most
19
significant problems to the world’s economy had been the lack of efficient organizational
controls and transparency that has led to corrupt behaviors surrounding the cases such as
corporate financial scandals (Abdullahi & Mansor, 2015; Free, 2015; Muhtar, Sutaryo, &
Sriyanto, 2018). The most notable cases of fraud came from companies like Enron,
WorldCom, and Tyco, and individuals like Bernie Madoff and Martha Stewart
(Abdullahi & Mansor, 2015; Komarova Loureiro et al., 2016; Lokanan, 2015).
The motivation to commit fraud can arise from various sources. Based on the
fraud triangle theory, pressure, opportunity, and rationalization are significant factors for
individuals to commit fraudulent crimes (Cressey, 1950). For instance, employees’
ethical values are significant to their actions on opportunity and rationalization to commit
fraud (Said, Alam, Ramli, & Rafidi, 2017). Several authors have also argued that for
fraud to take place in an organization, the pressure, opportunity, and rationalization must
be present simultaneously (Abdullahi & Mansor, 2015; Astuti et al., 2015; Carver et al.,
2015; Komarova Loureiro et al., 2016; Lokanan, 2015; Roden, Cox, & Kim, 2016; Said
et al., 2017). Nonprofit leaders should analyze and fully understand the causes of
employees to engage in financial fraud and find strategies to mitigate fraud for
organizational performance. The indications of fraudulent activities may result in the
short or long-term lack of liquidity or customer deception (Hsu, Wiklund, & Cotton,
2017; MacLennan, Piña, Hafford, & Moran, 2016).\
To address fraud, policymakers must consider the rationale and automatic
contributors to help curve these behaviors (Komarova Loureiro et al., 2016).
Additionally, effective leaders should motivate employees to overcome their self-interest
20
for the benefit of the organization (Sun & Wang, 2016). It is also essential for nonprofit
leaders to understand that they are not immune to unethical behaviors, and fraudulent
activities could pose a significant risk to an organization’s finance and culture (Mlambo,
Mubecua, Mpanza, & Mlambo, 2019). But financial resources are essential for nonprofit
organizations to sustain social programs in the communities (Archibald, Daniels, &
Sinclair, 2017); therefore, understanding the causes and effects of these unethical
behaviors may significantly help nonprofit leaders when such acts occur (Guest, 2017;
Jakhu &Malik, 2017).
Pressure. Individual pressure is an influence on individuals to engage in
fraudulent activities, which can cause financial problems to the organization (Mansor,
2015). Using an empirical study and psychoanalysis method to distinguish perceptions
and ideas, Arlow (2018) found that awareness is critical to control internal and external
feelings to commit fraudulent behaviors. On the other hand, Pamela, Murphy, and Free
(2016) used a survey to identify how an instrumental organization climate affects fraud.
Pamela et al. found that 39 % of respondents admitted committing fraud. Pamela et al.
concluded that the pressure on individuals does not need to make sense to outside
observers, but it does need to be present. In the case of financial fraud, usually, a
temporary situation arises where there is a chance to commit fraud without a high chance
of prosecution. Johanson and Carey (2016) argued that financial problems are not the
only reasons individuals commit fraud. Per Johanson and Carey (2016), some individuals
engage in fraudulent activities for many reasons, such as the desire to buy expensive cars,
houses, or clothes. Dellaportas (2013), Neu, Everett, and Rahaman (2013) also identified
21
work-related pressure, the pressure associated with gambling and drug addiction, and
pressure associated with individuals as non-financial pressure factors that lead individuals
to engage in unethical behaviors. Lokanan (2015) explored the assertion of the fraud
triangle as a critical tool to mitigate fraud in the workplace. The author found that fraud is
a complex phenomenon that involves workplace satisfaction and social inequities.
Business managers or leaders should be aware of implementing ethical values and
strategies to see fraud as an act of revenge against their employers.
Non-shareable financial pressures consist of financial stress experienced by an
individual. Workers’ dissatisfaction and perceived inequities are the main predictors that
motivate and contribute to work-related non-sharable financial pressures and fraudulent
acts in the workplace (Pwc, 2014). Cressey (1953) opined that when someone in a
position of trust violates that trust to address non-sharable financial pressures, the
perceived opportunity to commit fraud arises. Lokanan (2015) explained the fraud
triangle as a useful framework to mitigate fraudulent acts and added that individuals
might commit fraud because of non-shareable financial pressure. To Lokanan, when
individuals feel the strain, they tend to contravene the law to solve their problems.
Nonprofit leaders should understand the nature of non-financial pressure that their
employees may face to mitigate the effects of fraudulent acts (Burnes et al., 2017). Based
on the fraud triangle theory, despite the pressure an individual may or may not face, the
risk of committing financial fraud is always permanent unless there is no opportunity
(Drabkova, 2018).
22
Opportunity. An opportunity to commit a crime reveals that there are gaps of
ineffective controls and a governance system that allows an individual to commit
organizational fraud. Neu, Everett, and Rahaman (2013) analyzed the nature and role of
accounting practices in mitigating fraudulent practices and found that skillful use of
accounting and social interactions enable corruption. The authors also argued that the
opportunity to engage in fraud increases as the organization’s control structure weakens,
its corporate governance becomes less effective, and the quality of its audit functions
deteriorates. Similarly, some authors argued that the opportunity for an individual or
group of individuals to commit fraud is often due to the lack of supervision or regular
internal controls of the company (Arshad, Razali, Bakar, 2015; Astuti, Zuhrohtun, &
Kusharyanti, 2015). The lack of internal controls promotes an atmosphere that may
motivate, create, or present an opportunity to commit a crime. When internal controls are
weak or if there is a lack of ineffective board governance, opportunities to commit
fraudulent acts increase (Jaroslaw, 2016).
Organizational management discussion and analysis reports are internal controls
and archival documents that distinguish between fraudulent and truthful reports (Purda &
Skillicorn, 2015). Based on the scandal from the early 2000s from organizations such as
Tyco, Enron, and World Com, the United States Congress enacted the Sarbanes-Oxley
Act of 2002 in order to tighten the regulations on internal accounting practices and
increase transparency in financial transactions of companies (Black et al., 2017;
Camfferman & Wielhouwer, 2019). Gordian and Evers (2017) argued in their empirical
study that organizational culture depends on managers’ abilities to implement controls
23
and found that the adverse effects of fraud affect the organization’s longevity.
Accounting control systems and evaluation mechanisms should be managerial tools that
contribute to sound decision-making, strategic planning, and implementation (Alferjany,
Salama, Amuna, Shobaki, & Naser, 2018). Per Leitner and Wall (2015), nonprofit
organization leaders or managers must review the internal control systems to sustain
transparency and promote internal controls to detect fraud, which may not be visible in
regular business activities.
Rationalization. Rationalization increases the likelihood to commit fraud.
N’Guilla-Sow, Basiruddin, Abdul-Rasid, & Husin (2018) used a sample of 126
Malaysian small and middle-sized enterprises to understand fraud schemes. Based on the
fraud theory, the authors found that rationalization played a critical role in the mindset of
a person to commit an unethical act or fraud. Morales, Gendron, and Guénin-Paracini
(2014) further used an empirical study to examine the genealogy of the fraud triangle and
found that rationalization is the third element of the fraud triangle, which indicates that
the fraud perpetrator must formulate some morally acceptable idea to them before
engaging in unethical behavior. If an individual cannot justify dishonest actions, it is
unlikely that he or she will engage in fraud (Yadav, 2016). Nonprofit leaders have the
responsibility to incorporate governing strategies in organizations that prevent individuals
from committing fraud.
Individuals rationalize their behaviors and actions that support and justify them
committing a crime. Kassem and Higson (2012) used an empirical study to explain
Cressey’s fraud theory to show its significance and present other fraud models that
24
auditors could consider in the auditing processes. Kassem and Higson found that fraud
has significant attention from regulators, auditors, and the public. Per Kassem and
Higson, a person’s rationalization thoughts may affect their ability to make an ethical
versus unethical criminal act. Abdullahi and Mansor (2015) echoed that if a person
cannot determine right from wrong in decision-making, it is likely, he or she may commit
a crime. Nonprofit policies and statements of ethics must be present in any organization
to ensure success because it is always probable that individuals engage in fraud for
diverse reasons.
Contrasting Theory of Ethical Concept
In nonprofit organizations, fraud may not always be visible and easy to detect. In
some cases, leaders may have to increase internal controls or promote ethical values to
mitigate fraud. In 1889, Immanuel Kant developed ethical theory and believed that
ethical values lead to the rightness of an individual’s action (Chilton, Foyou, & King,
2018). An individual that is aware of decisions and behaviors to commit fraud makes an
ethical decision. Abdullahi and Mansor (2015) used a conceptual approach to understand
and analyze the primary motivations of fraud by auditors, accountants, and other anti-
fraud agents. Using secondary sources from the internet, textbooks, and journal articles,
the authors found that dishonest and immoral individuals commit more fraud than people
with a high ethical value. Based on the evolution of ethics value, Adelstein and Clegg
found in their quasi-experimental study of 358 employees surveyed within a
pharmaceutical company on the Eastern coast of the U.S that ethics guide employee’s
moral and behavioral principles. Downe, Cowell, and Morgan (2016) added that ethical
25
behavior in organizations, which consist of the principles, policies, and guidelines are
critical sources that contribute to an effective governance of the organization. To
understand fraud’s nature, Sorunke (2016) echoed that the personal ethics of an
individual are critical factors in a fraudster’s motivation to commit fraud. To promote
ethical value, it is critical for nonprofit leaders to establish credible layers of code of
conduct that may detect and prevent fraudulent practices.
The ethical theory leads to certain qualities that define appropriate behavior and
the right action to undertake for the benefit of the organization (Yazdani & Murad, 2015).
Chan and Ananthram (2019) explained the ethical theory as a set of criteria for potential
decision-making or action taking in the interest of the organization. Treviño, den
Nieuwenboer, and Kish-Gephart (2014) argued that in organizational settings, people
who are acting and making decisions do so within the power and authority structures.
Nieuwenboer et al. also added that leaders make decisions under the organizational
leadership, peer influences, and constraints, which may lead an organizational leader to
act unethically or ethically.
Some scholars have studied the effects of ethics in organizations. Mathenge
(2014) used a survey questionnaire to measure the integrity and morality of Kenyan
police officers. Mathenge found that the lack of high ethical values such as competence,
confidence, and professionalism were the leading causes of corruption among police
officers. Similarly, several researchers have examined the influence of ethical values in
the workplace and found a correlation between ethics and job satisfaction (Evans, 2017;
Said, Alam, Ramli, & Rafidi, 2017; Soltani, 2014). Analyzing the role of ethics in
26
organizations, Hess and Cottrell Jr. (2016) argued that promoting ethical values might
reduce the tendency of employees to commit fraud.
On the contrary, Chen, Hou, and Lee (2013) and Yaakobi and Weisberg (2018)
found that the lack of employees’ ethical values would lead to bribery and corruption. Per
Chen et al., executive leaders who lack ethical values will tend to ignore policies and
procedures to pursue their self-interests. The findings of Chen et al. are significant in
improving decision-making and ethical value in organizations. Nonprofit managers
should promote ethical value to improve their leadership and managerial decisions.
The ethical theory is similar to the fraud triangle theory because of the dilemma of
decision-making. Individuals who engage in fraud under the fraud triangle theory must
go through three main stages of their decision-making. Cressey (1953) suggested three
primary perceptions that influence individuals’ choices to engage in fraud. Per Cressey,
pressure, opportunity, and rationalization are factors that motivate individuals to commit
unethical behaviors. For example, if a manager adheres to the ethical and moral standard,
his attitude, and position may influence followers to comply with ethical values and
contribute to detecting and mitigating fraud (Abdullahi & Mansor, 2015; Hammersley,
2015, Ho & Mallick, 2017). CAAs leaders must increasingly monitor compliance with
ethical codes and standards to promote trust and discourage fraud. However, poor
management monitoring controls may lead to weaknesses in ethical and moral values and
fraud detection. The fundamental tenets of ethical theory are critical for nonprofit
organization managers to provide strategies to mitigate fraud and increase confidence
among stakeholders.
27
Analysis of Fraud in Workplaces
Fraud is a reality in workplaces, and employees can be the most significant source
of fraud. Raval (2018) used a methodological approach to explain the role of human
desires, intentions, and actions in the indulgence of, or resistance to, and the act of
financial fraud. Raval found that the evidence from the fields of religion, philosophy,
sociology, neurology, behavioral economics, and social psychology leads to the
development of the disposition fraud model. Ge, Koester, and McVay (2017) echoed that
negative behaviors such as corruption or fraud could lead to organizational failure.
Bošković (2017) added that fraud could be an essential factor that can demotivate
employees to reach a company’s goals when it becomes regular and routine. Per Raval,
there are direct and indirect human attitudes in committing fraud. Based on the fraud
triangle theory, nonprofit leaders should rely on the disposition fraud model to predict
intentional actions of fraud.
Rossouw (2000) also indicated that a proper understanding of fraud phenomenon
is critical to undermining it. Using a qualitative case study, Rossouw analyzed the
motivation of fraud committed by the convicted people in prison and found that the fraud
committed by prisoners covered a broad spectrum. As stated by Tam (2016), fraud can
arise from self-centered considerations like greed or financial gain and other-centered
considerations like providing material assistance to family members or friends in need.
Rossouw’s conclusion also revealed that some participants committed fraud under the
pressure or voluntarily. Rationalization provided by the participants included blaming
others for their actions.
28
Fraud detection. Fraudulent practices have increased in the post-financial crisis
years, while at the same time; resources allocated to fight fraud have been insignificant.
Purda and Skillicorn (2015) developed a data-generated tool to distinguish fraudulent and
truthful reports of auditors and controllers. Based on the language used in the annual and
interim reports, the authors found that controllers and auditors used some languages to
cover up fraudulent acts that affected regulators and investors in choosing cost-effective
tools to make investment decisions. Appiah (2015) opined that a critical objective of
control should be to inform and assist management team leaders with the facts from
which they could make managerial decisions to improve business policies and
performance. Effective control should also take into account the alternative to detect
fraud by providing financial and nonfinancial tools for business prosperity (Chima,
Obiah, & Linda, 2018; Masegare & Ngoepe, 2018; Warren & Schweitzer, 2018).
Nonprofit managers should discourage fraud behaviors within organizations to encourage
a positive attitude during controls or audit operations.
Complying with accounting and financial principles is critical for effective
nonprofit organization leaders to promote transparency and detect fraud. Purda and
Skillicorn (2015) used a sample of quarterly and annual reports issued by firms with at
least one accounting and auditing enforcement release to assert fraud in organizations.
Using a decision-tree approach to establish a rank-ordered list of words from the
Management Discussion and Analysis sections, the authors suggested that real managers
should be able to differentiate false and truthful reports. Based on the top 200 words from
a selected list of words, and using the support vector machines (SVMs), Purda and
29
Skillicorn revealed that the lack of truthfulness in writing or reporting the facts could hurt
the quality and seriousness of the report. For Purda and Silicorn, each report should refer
to the real facts. An advantage of this approach is that one does not require any previous
knowledge of what may constitute a suspicious word and its updating based on new
reports. Dong, Liao, and Zhang (2018) added that effective managers who develop
statistical methods for analyzing the language used in the Management Discussion and
Analysis section of a firm’s annual and quarterly reports were critical tools of fraud
detection. Moreover, using scientific and analytic methods are also evolutionary fraud-
detection techniques that may contribute to business performance.
In the current environmental business context, researchers use statistical methods
to detect fraudulent activities while analyzing financial statements. Soviany (2018) used
artificial intelligence (AI) to detect online fraudulent transactions. Soviany focused on a
supervised learning engine with mega data components capable of supporting high-
performance fraud detection and improving the predictive value of original data. Soviany
found that one of the promising areas of AI application concerned the financial sector and
particularly the usage of AI to find solutions for fraud management. Technology
innovation may contribute positively or negatively to high-performance fraud detection
(Nuscheler, Engelen, & Zahra, 2019; Sarah, 2016). Having an adequate and appropriate
technological tool may be significant to mitigate or detect fraud before a catastrophic
situation arises.
The research of Albrecht and Hoopes (2014) on the public expectation of auditors
in detecting fraud was crucial for understanding how fraud occurs in organizations.
30
Despite the public’s view of auditors as organization protectors, accountants and auditors
have the primary duty to design, implement, and maintain a system of internal controls
that provide reasonable assurance for business performance (Church et al., 2018;
Permana, Perdana, & Kurniasih, 2017; Rieppel 2018). Dumay, La Torre, and Farneti
(2019) echoed that auditors have the responsibility to provide reasonable assurance that
financial statements are accurate and prepared consecutively by generally accepted
accounting principles. Albrecht and Hoopes’ (2014) findings regarding the experience of
an expert in witnessing numerous major fraud cases to illustrate situations in which
auditors can expect to detect fraud were crucial to assessing fraud in organizations. To
Albrecht and Hoopers, some factors make fraud nearly impossible to discover, even when
a competent auditor complies with the generally accepted accounting standards. Many
factors like misappropriation of assets or misstatement may make fraud difficult to detect
by auditors (Appiah, 2015; Jenkins, Negangard & Oler, 2018). Akeem (2015) added that
factors that make fraud detection particularly difficult are when audited financial
statements include the nature of accounting records, the use of outsiders to help conceal
the frauds, reluctance of people to disclose what they know, and forgery and lying.
Bhasin (2016) further identified four factors, which are not independent of each other, but
that existed in the financial statement fraud cases. Per Bhasin, inadequate training and
experience of the auditors, poor planning to gather evidence, and lack of professionalism
and independence are factors that lead to the audit inefficiency.
Technological fraud. The development of fraud increases with technology
innovation (Bhasin, 2016). Paté-Cornell, Kuypers, Smith, and Keller (2018) discussed
31
using Bayesian analysis, a general probabilistic risk analysis for cybersecurity in an
organization. According to Paté-Cornell et al., the risk of cybersecurity is increasing each
year, and companies are at risk if there are no efficient international and local regulations
to prevent businesses against cyber-attacks. The authors also found that the financial
losses for companies due to cyber-attacks come from risk management decisions based
on the lack of adequate data analysis and fraud prevention by managers. Biglow (2016)
and Daniel (2016) echoed that hacking, slamming, or changing the telephone service
without customer knowledge, phishing, or acquiring usernames, passwords, and credit
card information, are emerging types of thefts and frauds in the current business and
social environment caused by technology innovation. Raghavan (2018) added that it is of
vital importance that corporate managers understand the importance of financial crimes
as well as cyber risk attacks to protect their businesses against local and international
frauds. Managers must be aware of the impacts of technology innovation to discourage
fraudsters or thieves who exploit the weaknesses of internal control to engage in criminal
activities (Holt & Kennedy, 2019; Horn, Dunagan, & Carey, 2018; Ndofor, Wesley, &
Priem, 2015).
Fraudulent language. Analyzing fraud in the current business context,
Holderness Jr., McNeal, Riley, and Wells (2018) noted that new generation technology
divides the business world with new slangs and old phrasings. Over time, these types of
changes infiltrate into business communications. Bennett and Hatfield (2018) stated that
changes in language and communication affected the way auditors should analyze the
risk of fraud in the modern business environment. For example, using quick abbreviated
32
messages like emojis, memes, digital stickers, and other image-based digital
communications are different means that people use to interact with one another in
emails, text messages, instant messages, and on social media. Holderness et al. advised
audit leaders to encourage their staff members to have in-person conversations, especially
when seeking important or potentially sensitive information from clients. Auditors and
anti-fraud staff also need to take proactive steps to keep up with language and
communication changes so that they can effectively communicate with all parties during
their engagements.
Workplace crimes. Vadera and Pratt (2013) examined different types of
workplace crimes. The authors found that workplace crimes might consist of pro-
organizational, nonaligned-organizational, and anti-organizational crimes based on the
intentions of the perpetrators. Vadera and Pratt also found that fraud can be pathologic
and linked to various identification, such as over-identification, over-disidentification,
under-identification, and ambivalent identification. Gupta and Gupta (2015) opined that
pathologic fraud behaviors lead to propensities to commit other types of workplace
crimes. Employers should increase work meetings and training to promote ethical
standards and company culture among employees.
Vadera and Pratt’s analysis are critical to determining that over-identification and
over-disidentification have direct effects on workplace crimes, whereas under-
identification and ambivalent identification indirectly influence the propensity to engage
in workplace crimes. The results of Vadera and Pratt may lead to clarify the inconsistent
conclusions in previous work in workplace crimes and emphasizes the importance of
33
including organizational identification as a critical factor in the extant models of
workplace crimes. Tombs (2017) suggested that policy implications regarding workplace
crimes within different agencies might be more effective in enforcing laws and
disciplining individuals engaged in criminal activities.
Fraud in Profit Organizations
Many researchers and experts have written a lot about fraud in for-profit
organizations due to the increasing rate of fraud in the current business context. Sridharan
and Hadley (2018) used a case study methodology to investigate the factors that allowed
and encouraged a massive case of fraud at Wells Fargo. Wells Fargo is among the largest
and successful banks in the United States. Sridharan and Hadley founded that the effect
of internal audit failure, firm culture, board structure, and oversight were the significant
causes of fraud at Wells Fargo. Elson and Ingram (2018) echoed and highlighted that the
pressure to cross-sell was intense, and Wells Fargo managers provided its employees
with compensation to cover fraud. Opening deposit and credit cards account for more
than two million customers without customers’ authorizations were the vast scandals that
affected the reputation and credibility of the banking systems. Per Elson and Ingram,
Wells Fargo employees from top to bottom committed both frauds and crimes.
Wells Fargo crimes and frauds affected business activities. The company’s global
managers of internal audit who created fake customer identities and generated fake
invoices against their names committed fraud to inflate the company’s revenue. Zerban
(2018) revealed in his conclusion that the global head of internal audit of Wells Fargo
also forged board resolutions to obtain loans illegally for the company in this scheme
34
fraud. It also appeared that the cash that the company raised through American
Depository Receipts in the United States never made it to the balance sheet. Greed for
money, power, competition, success, and prestige were the compelling forces that
influenced Well Fargo managers to violate bank regulations.
In a similar case, Drábkova (2018) evaluated the risk of the effect of accounting
errors and frauds on reported accounting records based on the CFEBT risk triangle of
accounting errors and frauds. Drábkova used a case study to examine a selected
accounting unit predominantly operating in trade during 2011 and 2015. Per Drábkova,
there were significant discrepancies between the generation of earnings and an increase in
cash flow. The detection and evaluation of the effects of accounting errors and frauds for
a selected accounting unit negatively affected the reliability of financial records.
Alali, Sophia, and Wang (2017) set out to analyze how financial reporting quality
affected trends in restatements and frauds from 2000 to 2014. This analysis period
included the passage of the Sarbanes-Oxley Act of 2002, which enacted financial
disclosures to restore public confidence in the U.S. capital markets following significant
accounting scandals in the early 2000s. Using compiled data from across the public
reporting sphere, Alali et al. discovered that financial frauds were considerably lower
than financial restatements during the analysis period. Jan (2018) added that the
incidence of companies with both false financial restatements and frauds detected might
affect the viability of the business. The conclusions of Alali et al. are consistent with
prior studies on the trends of restatements of financial statements.
35
Bhasin (2013) used a qualitative case study to explore and describe fraudulent
financial reporting practices in the most significant fraud cases in India, which involved
Satyam Computer Services, labeled as “India’s Enron” by the Indian media. Bhasin
wanted to highlight the increasing rate of white-collar crimes and claiming stiff penalties,
exemplary punishments, and effective enforcement of the law with the right spirit. Per
Bhasin, the Satyam Computer’s creative-accounting scandal brought to limelight the
importance of ethics and corporate governance. Williams (2018) echoed that the
Sarbanes-Oxley Act of 2002 is improving corporate governance and decreasing the
incidence of fraud in the current business context. In recent studies and survey analysis,
some researchers indicated that investors and corporate managers continue to have
concerns about financial statement fraud (Prescott & Vann, 2018; Roychowdhury &
Srinivasan, 2019). According to Bhasin (2013), many employees who commit financial
statement frauds are senior managers, middle and lower-level managers, and
organizational criminal activists. Zerban (2018) opined that CEOs and chief financial
officers (CFOs) committed accounting frauds to conceal real business performance,
preserve personal status and control, and maintain high personal income and wealth.
Middle and low-level employees falsified financial statements related to their area of
responsibility like a subsidiary, division, or service, to conceal poor performance and to
earn performance-based bonuses. In his conclusion, Bhasin revealed that the CEOs and
the company’s global head of internal auditors used several different techniques to
perpetrate fraud in the company. Nigrini (2019) opined that creating false bank
statements and falsifying bank accounts to inflate the balance sheet and income statement
36
are acts that may envisage up to 10 years in prison and million dollars fines for
fraudsters. Real managers should hire credible and loyal agents in the finance and
accounting services to prevent the falsification of financial statements.
Salem (2012), on the other hand, sought to answer some questions relevant to
fraud detection and technology associated with fraud prevention in the computer systems.
Salem, in his analysis, wanted to categorize fraud, learn the motivations behind the fraud,
the nature of the organization, and individuals involved in computer misconduct
practices. Zhang (2018) noted that auditors have a more prominent role in uncovering
fraud and must be vigilant in the execution of their responsibilities by ensuring the truth
in their analysis. Zhang further identified common symptoms of acts of fraud and argued
that real auditors should be acutely aware of acts, types, and symptoms of fraud. Tunley,
Button, Shepherd, and Blackbourn (2018) echoed that those likely to commit fraud are
mostly corporate officers and other employees in the positions of responsibility in
accounting and data analysis processing. A reliable system of internal control is the most
effective way of fraud prevention (Li, Dai, Gershberg, & Vasarhelyi, 2018). Managers
may prevent fraud in exploring new computer technology as well as improving computer
security within the organizational systems.
The exact nature of fraud is very complex to master. Free and Murphy (2015)
used an inductive analysis to investigate the reasons why individuals co-offend in fraud.
Based on the interview with 37 convicted fraudsters, Free and Murphy found that the
reasons for instigating co-offender frauds vary according to the nature of ties between co-
offenders in the commission of fraud. Bishop, Hermanson, and Riley (2017) echoed that
37
the key differences between the primary beneficiary and the qualitative nature of fraud
were factors that motivate individuals to propose or accept an offer to participate in fraud.
For maintaining shareholders’ trust, managers must master the concept of the triangle
theory (Greve & Pedersen, 2017; Hung & Cheng, 2018; Lenz & Graycar, 2016). Under
the triangle theory, managers who understand the true nature of fraud have the chance to
increase stakeholders’ satisfaction. Effective business managers need to understand
individual fraud motivations to mitigate fraud and ensure the best future of the
organization.
In response to calls for more research on how to prevent or detect fraud, Murphy
and Dacin (2011) developed a framework to identify psychological pathways to fraud.
Per Murphy and Dacin, multiple theories relating to moral intuition and disengagement,
rationalization, and the adverse effect of fraud were three psychological pathways that
lead to fraud. The purpose of developing a psychological framework by Murphy and
Dacin was to draw attention to under-researched aspects of ethical decision-making and
to increase the understanding of psychology in committing fraud. Lokanan (2015) echoed
that, when individuals have an opportunity and pressure to commit fraud, there are three
psychological pathways to fraud nestled within attitude or rationalization. To Lokanan,
the lack of awareness, intuition coupled with rationalization, and reasoning are
psychological pathways to fraud. Similar to the fraud triangle theory, understanding the
psychological mechanism of fraud is critical for effective business leaders to prevent
fraud in their organizations.
38
It is paramount for business leaders to identify certain insidious situational factors
in which individuals commit fraud and to extend the knowledge of rationalization to
reduce the negative effect on accompanies’ performance (Lokanan, 2015). Ekhomu
(2015) opined that several other methods to reduce fraudsters’ practices exist and could
serve as potential psychological red flags to predict future fraudulent behavior. For
example, managers can motivate employees to suggest in open meetings any constructive
idea to increase job satisfaction. Job satisfaction is an essential factor in increasing
performance and psychological satisfaction in the workplace (Bin, 2015; Boskovic, 2017;
Guest, 2017; Wu et al., 2017). Nonprofit leaders can use the psychological framework as
a theoretical foundation to explore several interventions to mitigate fraud.
Writing on financial accounting fraud, Sharma and Panigrahi (2012) argued that
with an upsurge in financial accounting fraud in the current economic environment,
financial accounting fraud detection became an emerging topic of great importance for
academic and industrial researchers. Cao, Chychyla, and Stewart (2015) stated that the
failure of an internal auditing system of the organization in identifying accounting frauds
led to the use of specialized procedures to detect financial accounting fraud. However,
dealing with large data volumes and complexities of financial data are significant
challenges for forensic accountants (Jackson, 2017; Vasarhelyi, Kogan, & Tuttle, 2015;
Taminiau, Heusinkveld & Cramer, 2019). Sharma and Panigrahi’s finding was a
comprehensive review of the literature for the detection of financial accounting fraud and
indicated that logistic models, neural networks, Bayesian belief networks, and decision
trees were appropriate for the detection and classification of fraudulent data.
39
Similarly, Soleymani et al. (2018) used an unsupervised data-mining algorithm
and implemented an outlier detection model to assist experts in detecting medical
prescriptions suspected of fraud. Data sets included information about the insured,
prescribed medicines, and information about medical providers in 2013. The findings of
Soleymani et al. indicated that the data-mining algorithm could help accurately detect
potential fraud cases in medical prescriptions and reduce the number of medical
prescriptions and investigators’ heavy workloads.
Kaplan, Pope, and Samuels (2015), on the other hand, studied what influences
fraud reporting in organizations. Kaplan et al. noted that only a fraction of employees
who discover fraud report it to managers. Given the severe consequences of fraud, a
better understanding of the factors influencing individuals’ intentions to report fraud is
crucial, particularly to a non-anonymous recipient such as a manager. Peltier-Rivest
(2017) stated that reporting fraud to a manager must be a procedural safeguard to sustain
business longevity. However, the fraud triangle theory helps to master the type of fraud
and its effects on business growth.
Lack of transparency leads to fraud (Jackson, 2017). Kaplan et al. (2015)
contended that employees are the primary sources from which frauds occur. Kaplan et al.
also indicated how managers should handle a fraud report to promote productivity. The
conclusion of Kaplan et al. was consistent and aligned with previous research, which
showed that participants make stronger attributions to a person engaging in
misappropriation of assets compared to a person engaging in fraudulent financial
reporting.
40
The causes and consequences of fraud in profit organizations are numerous.
Pamela et al. (2016) used a survey to combine three groups of individuals who had fraud
experience. Pamela et al. surveyed prisoners who committed fraud within an
organization, individuals who audited or investigated fraud within an organization, and
individuals who witnessed fraud within their organization. In their analysis, Pamela et al.
found that 39 % of the respondents agreed that an instrumental climate was present when
the fraud occurred within the organization. Tepper, Simon, and Park (2017) argued that
an instrumental climate is significantly associated with a malevolent work environment
like being mistreated and social incentives and pressures. Pamela et al. found that
substantial support for the use of externally oriented rationalizations and an instrumental
climate are the claims that help employees to perform acts that benefit organizations. The
study also revealed that an instrumental climate is not associated with conventional
attitude variables like the prior history of white-collar crime, character, or ethical values
of the perpetrator or internally oriented rationalizations such as minimizing or ignoring
the consequences of the fraud or individual greed or need. Cao et al. added that
employees within instrumental climates make decisions based on their self-interest or in
the interest of the organization to the detriment of others. Referencing the fraud triangle
theory, the conclusion of Pamela et al. is a good explanation of employees’ fraudulent
behaviors in profit organizations.
Ethical climate theory is a crucial concept that contributes to mitigating fraud.
Brown, Hays, and Stuebs Jr. (2016) stated that the fraud triangle theory offers an
insightful theoretical framework for investigating an organizational climate that
41
experiences fraud. The use of ethical climate theory was appropriate because empirical
work in ethical climate theory has identified five distinct climate types within
organizations. The five climate types are instrumental, caring, independent, rules, and law
and code (Pamela et al., 2016). The analysis of Pamela et al. was significant about fraud
investigation, and managers may explore the concept of fraud to implement new
strategies to improve and sustain the business.
Ethical behavior is an essential factor in fraud analysis. Krause (2016) discussed
the gray areas of health care fraud and found that medical frauds have a direct effect on
federal government health care programs. Gordian and Evers (2017) opined that
corruption in the healthcare industry has increased the last past 5 years and resulted in
many medical devices recalls affecting people healthcare. Government leaders and
business managers should improve and promote ethical behaviors for the welfare of the
entire local communities. As explained above, Krause’s analysis referred to the fraud
triangle theory and contributed to the prevention of businesses collapsing from fraudulent
activities.
Fraud in Nonprofit Organizations
Effective leaders sustain their business activities by complying with the
company’s policies and government regulations. Writing on fraud in nonprofit
institutions, Murphy (2015) explained that some nonprofit organizations have a unique
environment that can contribute to fraud. Common characteristics such as an outlook of
trust, significant control by a limited number of people like founders, executive directors,
or CEOs, can contribute to the likelihood of fraud (Girgenti & Hedley, 2016). McDonnell
42
and Rutherford (2018) added that limited human and financial resources, reliance on
volunteers, higher turnover, and weak internal controls are among the primary factors that
contribute to fraud in nonprofit organizations. Ammar (2017) opined that managers for
nonprofit organizations could use and explore different strategies to prevent fraud and
ensure effective control to achieve a company’s mission and goals. Goreva, Luther, and
Bromall (2013) analyzed how the adoption of accounting information systems has
contributed to the incidents of embezzlement in small nonprofit organizations. Goreva et
al. estimated the annual losses for fraud to nonprofit organizations at 6% of fund-raising
revenues, 13% of operating budgets, and the total annual losses at $40 billion. In their
conclusion, Goreva et al. found that risk management, theft, fraud, and embezzlement in
nonprofits are increasing each year. It is critical for nonprofit organization managers to
assess regularly all risks related to fraud for the longevity of their organization.
Fraud has become a cause of concern despite the nature and type of organizations.
Dzomira (2014) stated that nonprofit entities must promote good governance and trust
among organizational members. The fraud schemes, which occur in commercial and
other trading organizations, are also typical in nonprofit organizations (Zack &
DeArmond, 2015). Dzomira (2014) noted that nonprofit making sectors have a crucial
role to play in satisfying the desire of the social community, whether it is religious,
health, cultural, or other human service organizations. Murphy (2015) echoed that
nonprofits agencies do not operate on a commercial basis and mostly rely on members’
subscriptions and contributions. The capital of nonprofit organizations come from public
43
or private grants or other fundraising events. Managing and preserving such entities’
resources are in the hands of the boards and officers.
Internal control is equally an essential function to any organization, whether
profit-oriented or non-profit oriented. Gottschalk (2016) argued that in nonprofit
organizations, the internal control has a crucial role in ensuring stakeholders about
reliable information regarding donor funds, grants, and fundraising, while in profit
organizations, audit and control assess risk management and prevent accounting
irregularities. It is the internal control function, which defines whether the policies,
procedures, and practices designed and approved by organizational managers and the
board are operating correctly. Dzomira (2014) echoed that the role of internal control is
to provide reasonable assurance regarding the effectiveness and efficiency of operations,
reliability of reporting, and compliance with the applicable laws and regulations. Per
Dzomira, nonprofit entities lie in good stewardship, transparency, and accountability of
the board and management. Administrators of nonprofits organizations must always be
vigilant on fraudulent actions, which may include cash theft, expense account fraud,
misuse of organizations’ intellectual property, and inventory theft (Kaplan et al., 2015).
As stated by Alali, Sophia, and Wang (2017), most of the nonprofit organizations do not
have efficient internal controllers, officers, and other relevant staff to monitor the controls
and establishment of an ethical code to ensure organizational effectiveness.
Sound internal control is vital for nonprofit organizations. Dzomira (2014) noted
that there are five components of internal sound control. Per Dzomira, the five
components are (a) control environment, (b) risk assessment, (c) control activities, (d)
44
information and communication, and (e) monitoring. Furthermore, Dzomira (2014)
explained that the context of internal controls embodies the organization’s principles,
trust, values, norms, and culture. Internal controls should refer to systems of policies and
procedures that provide safeguard to an entity’s assets and other resources usable by the
organization, accurate and reliable financial reporting, regulations compliance, and
effective operations (Susanto, 2017). According to Raval (2018), internal sound control
includes the safe custody of funds received by cashiers, accurate, and timely financial
expenditures reporting. The board members and senior management should review and
adopt the completion of annual audited financial statements before public disclosure.
Therefore, internal controls focus on an organizational risk assessment, general oversight
provision, and reporting on the nonprofit entity’s control position.
Frauds committed against and by employees of nonprofit organizations can be
internal or external to the organization. Arend, Sarooghi, and Burkemper (2015) stated
that internal frauds include asset misappropriations, revenue, and cash receipts. Theft-
involving cash occurs when an individual takes money for personal use and does not
usually appear in the accounting books (Gordian & Evers, 2017). For example, the
perpetrators could be the person either who collects the cash, opens incoming emails,
logs in cash receipts, manages bank deposits, or collects cash from financial agencies.
Theft of donated items or goods is a lack of proper records on donated merchandise by
most nonprofit organizations, especially religious entities such as churches. It is via such
slackened controls that the perpetrators take advantage of the lack of controls to commit
fraud (Dzomira, 2014; Ho & Mallick, 2017).
45
The other forms of internal fraud in nonprofit institutions include purchasing and
cash disbursement, using, for example, a credit card abusively. The fraudulent use of
organizations’ cards for personal use by the perpetrators is a negative behavior to the
organization. Dzomira argued that using ghost or fictitious vendors is common in most
nonprofit organizations, and fraud can occur while employees create, for example, a fake
supplier company and submit fake invoices for payments. In addition to fraud in
nonprofit companies, there is the fraud of payroll padding and employee expense
reporting and ghost employees. This is a simple act in most nonprofit organizations
whereby either maintaining laid-off employees or setting up fictitious employees on the
payroll. The perpetrator cashes the checks made out to these fake employees (Dzomira,
2014).
In addition, the staff of nonprofit organizations can create fictitious expenditures.
For example, creating fake invoices or working hour’s overstatement for later
reimbursement or payment. The responsible employees can claim more than the worked
hours by their juniors and make a fake agreement between the supervisor and the junior
to steal the company. Arend et al. explained that other asset misappropriations embody
personal use of the organization’s assets or resources. For example, employees using the
organization’s computers, software, and printers for personal projects are negative
behaviors or fraudulent practices. Dzomira opined that using personal long-distance
telephone calls, utilizing the organization’s internet access and e-mail for personal use,
using the organization’s photocopier to make copies of personal documents are new types
of fraud in the modern work environment.
46
External frauds perpetrated in nonprofit companies may include vendor or
supplier frauds. For example, a nonprofit entity might inflate or overstate fundraising
costs to programs to overstate expense ratios. Gordian and Evers stated that failure, for
instance, by donors to comply with the given requirements pertaining to donor funds
usage or misrepresenting the portion of donations are fraudulent practices. Nonprofit
organizational leaders should be aware of the consequences of noncompliance with
business policies to secure their organization from penalization.
Frauds committed by nonprofit managers may be intentional false financial
reporting. By creating a false assertion about financial statements, it would include, for
example, misleading donors through expense misclassifications regarding program funds
usage or restricted donation misclassifications. Roychowdhury and Srinivasan added that
non-disclosure of financial party transactions or revenue inflating through holding
records open beyond the period end are fraudulent practices. Fraud in nonprofit
organizations can also arise from failing to value receivables, inventory, donated assets,
and gift annuity obligations (Dzomira, 2014). Gottschalk (2016) analyzed the fraud
examination report written by the inspector general about Padakhep Manabik Unnayan
Kendra (PMUK) in 2012. PMUK is a nonprofit organization in Bangladesh, which
received $5.2 million US dollars from Save the Children association to prevent and
protect children against HIV/AIDS in Bangladesh. After an audit of financial statements,
the inspector general found that PMUK engaged in a scheme to divert the grant funds
disbursed under the HIV/AIDS program and revealed a loss of funds for $1,894,426. The
fraudster concealed the diversion through fabricated documents, including a set of
47
manufactured books and records to justify withdrawals that never actually took place, and
then withdrew funds separately (Gottschalk, 2016). Per Gottschalk, the fabricated and
falsified bank statements that led to a loss of money were evidence of fraud and affected
the company’s credibility.
Writing on internal controls in nonprofit organizations, Patterson and Kuperus
(2016) argued that complaining about embezzlement and mismanagement of funds from
religious organizations, particularly in churches, are increasing in the local communities
and need more attention of donors and official authorities. Such disgraceful acts have
raised many concerns about the effectiveness of internal control systems in churches.
Ahiabor and Mensah (2013) echoed that many churches have the perception that all
Christian workers are honest and sincere; hence, there are many cases of theft and fraud,
which are revealed or investigated by churches’ members. The donors also have the
perception that they are contributing to God and not a man, and all they want in return are
blessings from God; hence, they do not know what church leaders do with their
donations. Per Ahiabor and Mensah, many churches do not have internal controls to
hinder the effectiveness of church officers and employees. Church leaders need to rely on
external controls to prevent conflicts to ensure donors’ trust (Patterson & Kuperus, 2016).
However, Bennett and Hatfield (2018) noted that nonprofit leaders, including
pastors and religious leaders, should be aware of external audits to ensure that financial
controls and fraud prevention are adequate. The ACFE reported that less than 10% of
frauds discovered are the result of an audit by an independent accounting firm. On the
other hand, Yee, Sujan, James, and Leung (2017) used an empirical study and purposeful
48
sample of 83 Singaporeans from 25 organizations to analyze the role and effectiveness of
internal auditing on customers. Based on Marxist economic theory, the authors found that
auditors in profit and nonprofit organizations give greater scrutiny to items audited and
have a responsibility to give reasonable assurance that there are no material
misstatements in financial statements. Active nonprofit managers should have an absolute
responsibility for mitigating fraud and promoting auditor’s review and test financial
controls to ensure efficient control.
The purpose of an internal or external audit is to make sure that the management
staff is acting in the best interests of the organization (Patterson & Kuperus, 2016).
According to Moore (2016), nonprofit managers are the guiding eyes and responsible for
policies and legal compliance. Kotsanopoulos and Arvanitoyannis (2017) echoed that
complying with company, local, state, and federal regulations promote success and
development. Nonprofit leaders must encourage their employees to give feedback about
the code of conduct and suggest new insights to promote confidence in the workplace
(Sebastiano, Belvedere, Grando, & Giangreco, 2017). To mitigate fraud, effective
nonprofit leaders should use efficient managerial tools to oversee, listen, and
communicate effectively to deter fraudulent behaviors in their organizations.
Transition
In section 1, I presented the background, problem statement, purpose statement,
nature of the study, research question, and interview questions related to my study. I also
introduced the conceptual framework, operational definitions, assumptions, limitations,
delimitations, and significance of my study. Further, I presented the review of the
49
professional and academic literature, which described the concepts of fraud triangle
theory and addressed causes, consequences, and impacts of fraud on nonprofit
organizations’ performance.
In section 2, I presented a restatement of the purpose statement, the role of the
researcher, participants, and research method and design. I also described the population
and sampling, ethical research, data collection instruments and techniques, data
organization and analysis, and discuss data consistency and credibility in qualitative
analysis. In section 3, I presented the findings, the implications for social change, and the
recommendations for nonprofit leaders to mitigate fraud in their organizations. I also
formulated recommendations for further research and presented the conclusions of my
study.
50
Section 2: The Project
The primary purpose of this qualitative study was to identify strategies nonprofit
organization leaders used to mitigate fraud in their organization. Mitigating fraud should
be the primary goal of nonprofit managers who want to reach success and meet the
organization’s goals (Ge et al., 2017). As the primary researcher and data collection
instrument, my role was to collect data from five nonprofit agencies managers who have
more than 5 years of experience in their respective organizations. I used interview
techniques with open-ended questions and methodological triangulation to collect and
analyze data from the participants. I also included reliability and validity strategies to
increase the credibility of my research and comply with the ethical standards for
confidentiality and participants’ protection during the research processes.
Purpose Statement
The purpose of this qualitative multiple case study was to explore the strategies
that some nonprofit CAA executive leaders use to reduce fraudulent financial activities.
The population for this study included executive leaders of five nonprofit community
action agencies in Maryland who have implemented strategies that have successfully
reduced fraudulent financial activities. The contributions to social change are aiding
executive leaders in developing processes and procedures that advocate for better policies
and providing strategies to reduce fraudulent financial activities, promote corporate
responsibility, and influence the performance and positive outcomes of programs. The
contributions for social change can support the success of programs such as Head Start,
tax preparation, and adults’ and children’s education in local communities.
51
Role of the Researcher
A researcher’s role is to identify participants; collect, organize, and analyze data;
and present the findings (Yin, 2017). As the primary researcher, I selected organizations
with leaders who had a personal interaction and conversation with the study population.
To collect credible and specific information related to my study, I used an interview
protocol (see Appendix A), which is an instrument that researchers use to collect rich and
detailed qualitative data for understanding participants’ experiences (Patton, 2015). My
experiences and knowledge of working for 14 years as an accountant and chief financial
officer in a nonprofit organization were beneficial to understand fraudulent behavior in
the current business context and avoid possible bias in analyzing and interpreting my
findings. Mitigating biases is critical for demonstrating research credibility and
consistency (Baker, 2016; Bromley, Mikesell, Jones, & Khodyakov, 2015). Though as a
novice researcher, I did not have prior experience in academic research to mitigate
potential biases that could influence the results of my study, for my research, I used the
member-checking technique to improve my research consistency and credibility.
My additional roles consisted of adherence to Belmont Report Principles, which
recommend treating participants with respect, justice, and beneficence and secure the
data for the confidentiality of participants. As the study involved the use of human
subjects, compliance with ethical principles was essential. Before collecting data from
participants, I received study approval from the Institutional Review Board (IRB) of
Walden University. The IRB process is critical to prevent the study’s risks and promote
the research’s consistency (Freed et al., 2016). Additionally, for the research credibility, a
52
researcher should adhere to ethical principles and prevent issues like participants’
autonomy, anonymity, confidentiality, beneficence, non-maleficence, and justice (Rogers
et al., 2015). For my research consistency and credibility, I sought the consent of the
participants by explaining to them the procedures of the study and their rights to
withdraw from the study at any time during the research processes.
I also remained aware of personal biases throughout the data analysis processes,
such as personal beliefs and biases regarding the study topic from participants who
worked for former employers. Awareness and management of personal biases ensure the
integrity of the data collection and analysis process (Ulrich et al., 2015). I sought
unbiased interview techniques when conducting all interviews. The interview questions
were neutral and open-ended. Interviewees had the same length of time to respond to
each interview question and provide their perspectives and insights on fraudulent
activities in their organizations.
Participants
In qualitative research, selecting appropriate participants is critical for presenting
a sound analysis (Yin, 2017). Selecting reliable participants is critical for a researcher to
collect valid information (Hassan, Nadzim, & Shiratuddin, 2015). The participants in this
study were executive leaders of CAAs in Maryland. I selected participants who were able
to understand and respond to the research question. I used a purposive sampling method
and Google search engine to select a sample size of five executive leaders who have
implemented strategies to reduce the frequency and effects of fraudulent activities in the
CAAs. I referred to the eligibility criteria to select my participants. The eligibility criteria
53
were top executive nonprofit leaders or managers who have business and fraud mitigation
experience in their organizations. Executive leaders and officers had more than 5 years of
managerial and leadership experience among a population of CAAs located across the
state of Maryland. Building a healthy relationship between a researcher and participants
to collect information using a qualitative methodology is important to the effectiveness of
the study (Cunliffe & Alcadipani, 2016). Developing trusting relationships with
participants is a pathway to gaining access to interviews for your study (Taylor, Bogdan,
& DeVault, 2016). For my research, I was honest and open to build trust with
interviewees to collect reliable and credible information about using the fraud triangle
theory to respond to the research question.
Research Method and Design
Research Method
The three research methodologies are quantitative, qualitative, and mixed
methods (Hyett, Kenny, & Dickson-Swift, 2014). Researchers use a quantitative
methodology to measure variables, test hypotheses, analyze causal relationships between
variables, generate value-free predictions, and generalize the research outcomes
(Makrakis & Kostoulas-Makrakis, 2015). In this study, I was not testing a hypothesis or
looking for causal relationships; therefore, quantitative method was not appropriate for
the study. In contrast, researchers use qualitative methodology to collect information
from participants who lived and experienced the phenomenon analyzed (LeRoux, 2017).
A qualitative methodology was appropriate for this study to collect reliable information
about what participants think about mitigating fraud in their businesses. Qualitative
54
research is critical to reveal alternative concepts regarding a real business problem, which
emphasizes the socially constructed nature of reality, holism, exploration, flexibility,
meaning-making, and understanding of the business problem (Makrakis & Kostoulas-
Makrakis, 2015). Some researchers have used mixed methods research to combine both
qualitative and quantitative methodologies to address the research question (Guetterman,
Fetters, & Creswell, 2015), but using a mixed methodology was not appropriate for my
study because I did not generate two types of data outcomes.
Research Design
In this qualitative study, the design I used was a case study. In case study
research, the researcher provides a combination of structuring the research and the
significant parts to show how the research project work together to address the research
question (Trochim, 2006). Case study research constitutes an all-encompassing method
that covers the logic of design, data collection techniques, and specific approaches to data
analysis (Yin, 2017). High-quality case study research is focused on rigor, validity, and
reliability as well as evaluation (Yin, 2017).
Phenomenology is the empirical study of the different ways in which people
understand various phenomena in the world around them and how these ways of
understanding relate to one another (Stenfors-Hayes, Hult, & Dahlgren, 2013).
Phenomenology is a research method for mapping the qualitatively different ways in
which people experience, conceptualize, perceive, and understand various aspects of
phenomena in the world around them (Stenfors-Hayes et al., 2013). Because the results of
a phenomenological analysis are the description of the essence of the lived experience of
55
a given phenomenon, it was not an appropriate design for the study because I was not
seeking to study past or convicted officials involved in fraud but current serving officers
of CAAs.
Additionally, narrative designs are used to describe in chronological order
individuals’ experience and life story (Lawrence & Tar (2013). In the ethnography
design, researchers use observation to analyze the culture of individuals (Ingham-
Broomfield, 2015). Narrative and ethnography are job-oriented and depend on the
researchers’ skills (Chien & Hassenzahl, 2017; Hallett & Barber, 2014; McKim, 2017).
For these reasons, ethnography and narrative were not appropriate for this research.
In qualitative research, some researchers often concern the development of
concepts that help understand social phenomena in natural settings by emphasizing the
meanings, views, and experiences of their participants. The analysis of qualitative data
represents one of the more challenging aspects of qualitative research (Kaczynski,
Salmona, & Smith, 2014). During my research analysis, I remained open to multiple
paths of meanings and more in-depth insight and the concurrent interplay between
inductive and deductive reasoning. To achieve data saturation, I ensured participants
respond in-depth to all interview questions and there was no new information emerging.
The case study design was useful to get answers for when, what, how, and why questions
to respond to the research question.
Population and Sampling
Researchers use a purposive sample to select participants according to the needs
of the study (Robson & McCartan, 2016). To answer my research question, I used
56
purposive sampling to recruit participants who knew the impacts of fraud in organizations
and who had managerial experience for more than 5 years of leading a CAA. Purposive
sampling is a useful technique to identify and select individuals knowledgeable about a
phenomenon analyzed and obtaining reliable information related to participants’
experiences (Palinkas et al., 2015). The state of Maryland has 17 CAAs. I used the
Google search engine and explored official reports and sources to know, locate, and
select participants who met the eligibility criteria.
The eligibility criteria included (a) be a top executive manager of CAAs with a
minimum of 5 years of managerial experience, (b) have more than 5 years of business
activities in Maryland, and (c) be a member of a CAA. After selecting the participants, I
sent an invitation letter and the informed consent form before organizing the interview
with each participant. For the credibility of my study, I organized the interviews at the
participants’ location. I ensured that the place was quiet to avoid any noises and
distractions. I also ensured the place was clean, clear and there was a good visibility to
read and write the summaries. After each interview, I identified new emerging themes
and collected new information until reaching data saturation. Data saturation is the
process of gathering data until reaching the point where there is no new information
arising to answer the interview question (Richards, 2015). My expectation of reaching
data saturation was after interviewing the fifth participant.
I worked for one of the CAAs in Maryland, where I led the office of planning,
evaluation, and research. My personal experience as a researcher was useful to use in-
depth interviews with the top executive leaders to collect data for this study. The results
57
of this research could aid other nonprofit executive leaders in developing processes and
procedures and advocating for better policies that reduce fraudulent financial activities.
Ethical Research
During a research study, researchers may face some severe or ethical issues when
interacting with participants (Greenwood, 2016). Ethical norms are general
considerations that a researcher must consider during research processes to preserve the
privacy and confidentiality of participants (Greenwood, 2016). Professional
organizations, research centers, and government agencies have regulated ethical
standards to protect participants and researchers during a research analysis (Hammersley,
2015; Haron, Ismail, & Abdul-Razak, 2011). It is crucial for both researchers and
participants to understand ethical standards for the credibility of the research (Robson &
McCartan, 2016). For the credibility of my research, I protected participants’ identities by
using codes P1, P2, P3, P4, and P5 to classify, identify, and categorize participants.
I also complied with the IRB that is responsible for ensuring that all Walden
University researchers comply with the university’s ethical standards as well as U.S.
federal regulations. IRB approval is required before the collection of any data begins;
therefore, I applied for IRB approval before the data collection process started. My IRB
approval is 04-08-20-0593098. Obtaining informed consent and maintaining participant
confidentiality are requirements for obtaining approval from the IRB (Yin, 2017). For
participants’ confidentiality and data protection, I protected and secured data in a locked
file cabinet for a minimum of 5 years for a potential audit before their destruction. After 5
58
years from my graduation date, I will use a shredder machine to destroy the interview
summaries, notes, and all information related to my research.
After obtaining IRB approval, I selected five participants, sent them an e-mail,
and gave them a phone call for the first contact to determine if they agreed to participate
in the study. I also sent them an informed consent form to comply with ethical
procedures. The informed consent form included the background information of the
study, outlined the expectation of participants, and provided details about the intent of the
study. The informed consent is typically a disclosure of the purpose of the study,
confidentiality of data, and statements that the data collected will be stored in a safe place
and used for only the intended purpose of the research. Moreover, I explained to the
participants that they could withdraw from the study at any stage of the research without
a penalty and assured that the study would not have any adverse impact on participants.
Moreover, I did not offer incentives to participants in this study and ensured to avoid
ethical and legal consequences when storing and securing my research information. I
secured participants’ signatures on the informed consent form for their permission in the
study. I encouraged participation in this study and highlighted the potential value that
could help other nonprofit CAAs to mitigate fraudulent financial activities.
Data Collection Instruments
For this study, I was the primary data collection instrument. The primary data
collection method for this qualitative multiple case study was a face-to-face interview
with semistructured questions. I chose semistructured interview questions because it gave
me the ability to prepare the questions ahead of time. I also consulted organizational
59
documents, archival materials, and the organization’s website content about fraud, as case
studies include the collection of data and information from multiple sources (Yin, 2017).
I used an interview protocol (see Appendix A) to create an overall picture of how
leaders in CAAs practice fraud reduction in their organizations. The participants included
leaders of five CAAs in Maryland. I requested permission from Walden University IRB
before conducting data collection (Yin, 2017). I contacted each participant with a written
letter and followed up with a phone call to set up the date and time for the one-on-one
interview. I asked participants for permission to record the interview and requested they
sign the informed consent form. Each participant received a copy of the informed consent
form and a demographic questionnaire to better understand and complete the interview
questions With their permission, I conducted and audiotaped the semistructured
interviews at the participant’s quiet and discrete office to conduct the interview with
success. The quality of the data also depends on the credibility of its sources (Mayer,
2015), which is why I audiotaped and transcribed the interviews. The use of open-ended
questions also ensured the collection of reliable and valid information (Vaughn & Turner,
2016). During the interview process, I also recorded notes of the answers given. After
asking each question, I used member-checking by sending participants a summary of the
interview for review to ensure the accuracy and clarity of the participants’ answers
(Harvey, 2015; Silverman, 2017). For consistency of my data, I also watched and
recorded any participant nonverbal cues and interview interruptions.
Researchers use member checking and triangulation to increase the credibility,
reliability, and validity of data collection processes in qualitative analysis (Caretta 2016;
60
Varpio, Ajjawi, Monrouxe, O’Brien, & Rees, 2017). The semistructured interview
questions generated rich, dense, and focused information that allowed me to provide a
convincing account of the problem under study. Given that the researcher and the
interviewees are the interactive sources of information in interview-based qualitative
studies, verbal fluency, clarity, and explicatory and analytical abilities are central to the
possibility of gathering in-depth information (Jamshed, 2014). The general aim of the
one-on-one interview protocol is to adopt an in-depth semistructured or conversational
method of interviewing style-allowing participants to speak freely about fraud and fraud
prevention programs in their organizations (Silverman, 2017).
For triangulation and knowledge gathering, I gathered and collected additional
sources from general information and organizations’ websites. I used the organizations’
public annual audited financial report to highlight their financial statements that
communicate its financial position, organizational programs, financial outcomes, funding
sources, and internal controls processes. Generally accepted accounting principles are the
measuring component for outcomes of businesses, organizations, and operations. There
are sections in the audit report that highlight audit findings or no audit findings and
whether the organization has the proper internal controls in place to meet generally
accepted accounting principles, mitigating fraudulent activities, and occurrences. The
auditors provide an opinion based on their review and certification. The organization’s
public audit report was one of the reporting tools and measurements for this study.
I used member checking to increase the validity, credibility, and transferability of
research techniques. Participants received a summary of their interview for review,
61
clarification, and suggestions of any other elements that were relevant to the study. Pre-
triangulation included the use of findings from the review of documents obtained from
their records and archives. Triangulation is typically a strategy for improving the validity
and reliability of research findings and strengthens a study by combining methods
(Wilson, 2014). In this study, I used data source triangulation to see if what I was
reporting carried the same meaning when found under different circumstances.
Data Collection Technique
The primary sources of data collection are observations, semistructured
interviews, documentation, and audio-visual sources (Yin, 2017). O’Keeffe, Buytaert,
Mijic, Brozovic, and Sinha (2015) argued that using a semistructured interview is more
reliable than other sources in collecting information from credible sources at a reasonable
cost. I used semistructured interviews with open-ended questions to generate discussions
about the topic and ensure the interview aligns with the research question. I used an
audio recording device to record the interviews as my secondary support to mitigate
biases and ensure the reliability of transcribed interview-responses. The interviews took
place in the offices of the participants. Before the one-on-one interviews start, I referred
to the interview protocol (see Appendix A) and ensured participants read and signed the
informed consent form.
I established rapport through the introductory stage with each participant to
stimulate participants’ confidence and willingness to participate in the study. Castillo-
Montoya (2016) argued that the aim of using an interview should be to encourage the
respondents to speak personally and freely about the topic. Participants responded freely
62
to seven interview questions from which I collected data to analyze strategies to mitigate
fraud in CAAs. I ended the interview with a closing remark to thank each participant. I
planned 5 weeks to collect the data from the five executive leaders of the CAAs. I used a
Sony recording device recorder for the participant interviews to transcribe and analyze
the data collection.
Collecting qualitative data can present some advantages and disadvantages (Yin,
2017). One of the advantages associated with qualitative data is that such data are
amenable to member checking and triangulation. Member checking and triangulation
allow participants to verify their responses and collecting data through two sources,
interview, and archival documents (Birt, Scott, Cavers, Campbell, & Walter, 2016;
Carroll & Huxtable, 2014; Suen, Huang, & Lee, 2014). I used documents and archival
records obtained from the agencies to validate the findings of the interview. Since
interviews were time-consuming, the documents and archive records supported and
helped in providing accurate and complete information to shorten the duration of
interviews. Preceding each interview process, I ensured the voice recorder was
functioning correctly and that the battery or the dry cells were in good condition.
Before the commencement of the interviews, the aim and design of the study
included the submission to the Walden University IRB for approval since I was using
human subjects (Yin, 2017). Upon receiving approval of the study by the Walden
University IRB, I selected study participants using purposive sampling. After the
approval by the Walden University IRB, I organized and prepared my interviews. The
interviews were open-ended questions to allow participants to respond freely (Appendix
63
B). I conducted member checking by asking each participant to review the summary of
the interview data and ensure the accuracy of the information collected from participants’
answers.
Data Organization Technique
Researchers organize data for providing transparency and preparing proper data
analysis (Yin, 2017). Yin argued that researchers use data organization techniques to
organize data by themes, trends, and patterns for easy understanding and reviewing of
data before analysis. Lewis (2015) argued that researchers should organize data to meet
research requirements and achievements. At Walden University, the institutional review
board members require researchers to secure data during the research processes and keep
them secured and locked for 5 years after the date of the research completion for a
potential audit (Walden University, 2016). For strategic and security reasons, researchers
should not share any information with individuals not involved in the research processes
before the official research publication (Greenwood, 2016). For my research, I stored
interview summaries, notes, and research journals in different folders with a protected
identification code for each participant. I also secured my data on a flash drive and
computer hard drive in a locked file cabinet accessible only by myself.
For my research, I verified and sorted the interview responses into categories by
themes and sub-themes. For confidentiality, each participant and transcript had an
identification code known only by myself. Transcriptions of participants’ data were
verbatim, except with any data or information that contradicts confidentiality. I removed
any conversation that was not relevant to the study through the transcription review
64
process of the data for accuracy. I used NVivo software to develop codes and themes
from raw data directly. Zamawe (2015) revealed that using NVivo software is critical to
mitigate research bias when converting interviews into summaries and to codify themes
into categories. I also used the journals to record dates and events happenings, as well as
folders to keep interview data of each participant separately and in a secured place. For
my data protection, I labeled all files, copied files on CDs and flash drives, assigned a
secret code to each participant to maintain confidentiality during the research processes,
and secured them in a locked place.
Data Analysis
Yin (2017) noted that case study research constitutes an all-encompassing method
that covers the logic of design, data collection techniques, and specific approaches to data
analysis and interpretation. Yin further emphasized the power of high-quality case study
research that focuses on rigor, validity, and reliability. According to Bernard and Ryan
(2016) and Patton (2015), the objective of data analysis in qualitative research is to
explore the meaning of data and ascertain various dispositions and implementation to
present the findings. Van Den Berg and Struwig (2017) argued that data analysis is a
paramount technique for searching data patterns and describing research data.
Researchers must have the responsibility to understand the context of data analysis to
present reliable findings and convince readers with the findings. As with all data, analysis
and interpretation are required to bring order and understanding; data analysis is an
interactive process, where data are systematically searched and analyzed to provide an
illuminating description of the phenomena under analysis. The process of data analysis is
65
to assemble or reconstruct the data in a meaningful or comprehensible fashion, in a way
that is transparent, rigorous, and thorough, while remaining ‘true’ to participants’
accounts (Joslin & Müller, 2016). During data analysis, researchers use the data
triangulation method to provide additional sources for improving accuracy, credibility,
validity, and reliability (Okoe & Boateng, 2015). Data analysis is an iterative or recurring
process that leads to the creativity or development of new ideas to clarify the meaning of
data (Cope, 2014).
Through the processes of my research, I used methodological triangulation to
collect data from the interview, companies’ documents, and observations. Researchers
use methodological triangulation to improve research quality, accuracy, validity, and
reliability (Morse, 2015). I collected my information from interviews with participants,
governments’ official sources, and organizations’ reports to triangulate. From data
collected from interviews, I used NVivo software to develop codes and themes from
which I analyzed the strategies that the CAAs leaders used to mitigate fraud. As
suggested by Saldana (2016), researchers need to focus on data quality rather than
quantity because data quality in qualitative analysis leads to credible findings. For an
excellent accomplishment of my research, I referred to Yin’s (2017) five steps in data
analysis. Per Yin, to present a sound analysis, researchers need: (a) collect data, (b)
regroup data, (c) interpret data, (d) analyze data, and (e) present the findings. For my
research and data analysis processes, I listened to the tape recordings several times and
identified themes or patterns. Then, I organized the data into categories and by question
to see patterns and connections between the categories. After that, I interpreted where I
66
should use the themes and connections to explain my findings. The analytic processes
were initial coding, adding comments and reflections, memos, looking for patterns,
themes, relationships, sequences, and differences. Finally, I explored patterns, elaborated
generalizations of themes to the fraud triangle theory, and presented my findings.
Reliability and Validity
Reliability and validity are crucial elements that researchers should focus on to
ensure the credibility of the study (Yin, 2017). Noble and Smith (2015) argued that
researchers could ensure validity by reflecting the view of the phenomenon studied and
reliability by presenting the consistency of the findings. The concepts of reliability and
validity may differ in a qualitative or quantitative method. Yin (2017) argued that
reliability and validity mitigate bias in research and promote transparency. For this
qualitative study, I used triangulation and member-checking to ensure reliability and
validity by collecting, organizing, and analyzing various sources of information. I also
assessed research quality by referring to the concepts of dependability, credibility,
confirmability, and transferability.
Reliability
Researchers refer to reliability to enhance the research’s dependability. Noble and
Smith (2015) revealed that the dependability of qualitative research studies includes the
use of rigor, reliability, and validity. In qualitative research, prolonged engagement,
persistent observation, and detailed description could lead to the rigor of a study (Lub,
2015). Bengtsson (2016) argued that researchers use reliability to select, justify, and
apply research strategies, procedures, and methods explained using the audit trail to
67
evaluate the effectiveness of the study. I created an audit trail for any person who would
like to review my study process. For the dependability of my research, I used member-
checking. I sent a summary of the interview transcript for review to participants to ensure
the accuracy of their answers and to mitigate any possible bias.
Validity
According to Marshall and Rossman (2016), the concept of validity in the
qualitative study implies a comparison to the concepts of credibility, trustworthiness, and
authenticity. The study is valid if the findings are accurate or correct, not only for the
researcher, but also for the participants and the readers of the study. Fusch and Ness
(2015) stated that validity is crucial in qualitative research attesting to the credibility and
accuracy of the findings. Researchers should mitigate bias in enhancing the validity of the
research results. For the study to be valid and trustworthy, researchers must combine
credibility, transferability, confirmability, and data saturation (Yin, 2017).
Credibility. To enhance credibility, researchers can use triangulation and member
checking (Yin, 2017). Brooks and Normore (2015) revealed that researchers could use
triangulation and member-checking to mitigate bias by ensuring the proper identification
and description of the phenomenon analyzed. Credibility in qualitative research is critical
to prove trustworthiness (Hussein, 2015). For my research, I ensured credibility by
collecting and aligning data with the primary goal of the study. I also used triangulation
with interview summaries, organizations’ websites, and government official sources; and
member-checking to strengthen the credibility of my study.
68
Transferability. Transferability is the ability to determine if different or similar
research findings exist in other studies (Hadi & Closs, 2016). Morse (2015) argued that
researchers must provide detailed descriptions to convince readers to make inferences
about the findings by providing readers with a rationale and rich details on the case
study. For my research’s transferability, I provided specific details about data collection
and analysis to enable readers to determine if similar findings or results exist in other
studies. I also used the principles of data saturation to enable readers to understand the
originality of the findings. Fusch and Ness (2015) noted that data saturation is the process
of conducting interviews until a researcher finds that there are no new data, themes, and
codes to add and use in the data collection processes.
Confirmability. Yazan (2015) argued that using NVivo software ensures a
research’s confirmability by providing the interpretation of data collection and analysis.
Confirmability is critical for readers to approve the findings of the research (Cope, 2014).
Marshal and Rossman (2016) suggested that researchers must convince readers to
confirm the conclusion of the study. For my research, I verified the confirmability of my
study by providing real evidence and cases of the impact of fraud on the CAAs. I also
used methodological triangulation by exploring data from semistructured interview
questions, organizations, and public information.
Data saturation. Researchers use data saturation to show the quality, credibility,
and transparency of the research (Senden et al., 2015). As suggested by Senden et al., my
goal was to avoid data redundancy and continuously analyze information from interviews
and organizations’ documentation until I reached data saturation. Fusch and Ness (2015)
69
noted that data saturation is the process of conducting interviews until a researcher finds
that there are no new data, themes, and codes to add to the data collection processes.
Saunders et al. (2018) echoed that researchers should continue to collect information until
reaching data saturation. For my study, I ensured data saturation by continuing to collect
data with additional interviews until no new themes, codes, or concepts emerge during
data analysis processes.
Transition and Summary
In Section 1, I presented the background, problem statement, purpose statement,
nature of the study, research question, and interview questions related to my study. I also
introduced the conceptual framework, operational definitions, assumptions, limitations,
delimitations, and significance of my study. Further, I presented the review of the
professional and academic literature, which described the concepts of fraud triangle
theory and addressed causes, consequences, and impacts of fraud on nonprofit
organizations’ performance.
In Section 2, I presented a restatement of the purpose statement, the role of the
researcher, participants, and research method and design. I also described the population
and sampling, ethical research, data collection instruments and techniques, data
organization and analysis, and discuss data consistency and credibility in qualitative
analysis. In Section 3, I present the findings, the implications for social change, and the
recommendations for nonprofit leaders to mitigate fraud in their organizations. I also
formulate recommendations for further research and presented the conclusions of my
study.
70
Section 3: Application to Professional Practice and Implications for Change
Introduction
The purpose of this qualitative multiple case study was to explore the strategies
that some nonprofit CAA executive leaders use to reduce fraudulent financial activities.
Fraud negatively affects business performance and exploring the impacts of fraud in
nonprofit organizations could lead to improved relationships between nonprofit
managers, government agencies leaders, and private or official contributors (Deslatte,
Schatteman, & Stokan, 2019). The consequences of fraud in nonprofit organizations may
lead to decreased trust among stakeholders and individuals’ well-being in the local
communities (Hou, Zhang, & Guo 2020). Finding strategies to mitigate fraud in the
CAAs made this study significant and relevant for future businesses. For data collection, I
conducted semistructured interviews with four top executive leaders of the CAAs located
in Maryland and performed data triangulation for my data analysis.
Based on the conceptual framework of the fraud triangle theory, the emergent
themes came from participants’ transcribed interviews, notes, memos, internal company’s
documentation, government documents, and the literature reviews. After transferring data
into NVivo 12 and using thematic analysis, I found three primary coding themes and six
subthemes related to the strategies needed for mitigating fraudulent behaviors in the
CAAs. The primary themes were (a) ethics and regulatory compliance, (b)
transformational leadership style, and (c) managerial skills. The sub-themes were (a)
honesty and loyalty, (b) stakeholders’ attitudes, (c) hiring and training, (d) adaptation to
change, (e) business skills and experience, and (f) understanding business practices. For
71
validity and reliability, I used member checking by obtaining and analyzing participants’
summaries validation and applied methodological triangulation by collecting additional
information from organizations financial reports for review and verification, and public
information about nonprofit organization records. My findings may help leaders or
managers of the CAAs to mitigate and prevent fraud, improve business performance, and
sustain organization longevity. I also provide some critical thinking and insights for the
further analysis of fraudulent behaviors in organizations.
Presentation of the Findings
The overarching research question for this research study was “What strategies do
nonprofit CAA executive leaders use to reduce fraudulent financial activities?” I used a
qualitative multiple case study, which was useful to collect information from different
participants who experienced the phenomenon. A multiple case study design was crucial
to better understand the phenomenon and get answers to who, why, when, and how
questions about fraudulent behaviors. For data collection, I conducted semistructured
interviews, which included seven open-ended questions (see Appendix B). Participants
included four top executive leaders of CAAs located in Maryland. For confidentiality, I
coded my participants as P1, P2, P3, and P4 and their companies as C1, C2, C3, and C4.
To mitigate research biases, I used an interview protocol, member checking in the
data collection and analysis processes, and adhered to the Belmont Report Principles,
which recommend treating during the research processes participants with respect,
justice, and beneficence. Member checking helped me clarify the meaning of
communications by the participants and agree with the content of their summaries after
72
receiving their feedback, which also helped with research validity and ensuring the
reliability of my research. Methodological triangulation was also helpful in the process of
data collection and analysis by providing more details about my research processes and
aligning my data with the primary research goal. For data triangulation, I used interview
summaries, the companies’ financial reports and documents, and nonprofit organization
public records from official sources.
For data analysis, I entered interview recordings, interview summaries, and notes
into NVivo 12 to identify nodes, themes, and subthemes. The results from NVivo 12 and
my analysis indicated three major emerging themes, which consisted of (a) ethics and
regulatory compliance, (b) transformational leadership, and (c) managerial skills. The
themes indicated the strategies needed for top managers or leaders of CAAs to mitigate
fraud in their organizations. Data saturation enhanced trustworthiness and validity by
ensuring that participants responded to all questions, and there was no new idea, code,
theme emerging during the research. After interviewing the fourth participant, I reached
my data saturation because there was no new information emerging to add to my
research.
The results of my data analysis sorted by NVivo 12 indicated that participants
supported that financial pressure, lack of ethics, and weakness of controls were among
the primary causes of fraud. I sorted through and analyzed the data results to reach the
conclusion that the fraud triangle theory was a crucial managerial tool to promote positive
behaviors and mitigate fraud in nonprofit organizations. All four participants concluded
that mitigating fraudulent behaviors are critical to ensure trust among stakeholders and
73
organization success. All participants admitted that promoting business ethical norms and
complying with organization regulations and policies contributed to prevent the loss of
money or other assets.
Participants also indicated that the strategy to promote internal controls by using
internal auditors to check cash receipts, pay stubs, and inventories was crucial to detect
and prevent accounting errors or fraud. Moreover, participants added that hiring external
controllers or auditors to conduct an independent analysis of their accounting records or
financial statement helped to increase the accuracy of financial records, detect, and
prevent fraud. P1 and P2 stated that fraud affects the organization’s reputation and
presented their strategies to mitigate fraud in the workplace by using, for example, the
background check before hiring new employees to ensure that they hire honest and loyal
people. Managers should mitigate fraud in the workplace to increase a company’s
reputation and customer satisfaction (Lokanan, 2015).
All participants also argued that increasing transparency and promoting full
disclosure of financial statements contributed to mitigate fraud and increased
stakeholders’ satisfaction. For example, P2 indicated that promoting employees to have
access to the content of financial reports and encouragement them to share their feedback
for any eventual issues related to fraud was crucial to mitigate fraud and promote the
credibility of the organization. P1 and P4 added that presenting a detailed financial report
to stakeholders allowed them to understand how their donations influenced the
organization’s goals and increased transparency over fraud. Moreover, participants stated
that they shared the disclosure of financial reports, allowing employees to understand the
74
impacts of fraud and be aware of fraudulent practices. The data analysis overall indicated
that combining the fraud triangle theory with ethics and regulatory compliance,
transformational leadership, and managerial skills were the primary strategies to prevent
and mitigate fraud in nonprofit organizations.
Theme 1: Ethics and Regulatory Compliance
The first emergent theme was ethics and regulatory compliance. Ethics and
policies are guidelines for employees to know and understand what is right to do
according to an organization’s core values and beliefs (Downe, Cowell, & Morgan,
2016). Increasing ethical and regulatory compliance leads to business effectiveness
(Cumming, Hou, & Lee, 2016). Based on the fraud triangle theory, the opportunity to
commit fraud may come from the lack of knowledge of ethical standards and business
regulations (Jarozlaw, 2016). I analyzed the data from transcribed interviews,
participants’ notes, organizations’ documentation, and government documents of P1, P2,
P3, and P4 and found that compliance with ethics and regulations were strategic to
mitigate fraud in nonprofit organizations (see Table 2).
From my literature review, I found that to prevent fraud and sustain activities over
time, nonprofit organization leaders should also implement ethical and regulatory
compliance to increase customers’ satisfaction. Stakeholders such as customers,
employees, and donors must be satisfied to sustain nonprofit organizations’ success
(Madura, 2015). Responses for ethics and regulatory compliance came from Interview
Questions 1 and 2, which focused on strategies to reduce fraudulent financial activities.
75
The responses from all participants indicated that nonprofit leaders used the concept of
fraud and ethics to increase incomes and sustain their organizations for a long time.
Participants argued that ethics and regulatory compliance were essential to
mitigate fraud and attain employees’ satisfaction while they understand their roles and
obligations in reaching the organization’s mission. Previous research has also indicated
that business leaders need to comply with both institutional regulations and ethical
standards to remain competitive (Girgenti & Hadley, 2016). P1, P2, and P3 presented
their business strategies in which they described the positive impact of regulatory
compliance. For example, P1 stated that “There is a written policy in place for record
retention and destruction, and the organization has a written procurement and
whistleblower policies that have been approved by the governing board.” P2 echoed, “We
are constantly assessing the policies and procedures in terms of likelihood and magnitude
of impact, determining a response strategy, and magnitude process.” P4 added,
“Improving practices of ethical behaviors contribute to discouraging the conflict of
interest and fraud.” Further, P3 added, “Unethical actions or the appearance of unethical
actions are unacceptable under any conditions.” The findings also showed that ethical and
regulatory compliance is critical to avoid penalization, which can affect organizations’
success. Participants argued that regulatory compliance increases honesty and loyalty
among stakeholders. Participants also recommended that nonprofit leaders should use
fraud and ethical theories as managerial tools to improve transparency.
The emergent theme of ethics and regulatory compliance aligned with the fraud
triangle theory conceptual framework and the body of knowledge from the literature
76
review in this study. Based on the fraud triangle theory, promoting ethics and regulatory
compliance allows employees to promote positive behaviors and practices, which is
crucial for mitigating fraud (Adelstein & Clegg, 2016). All participants agreed that
combining ethical value and regulatory compliance in their business practices with
honesty and loyalty and stakeholders’ satisfaction was critical to improve organizations’
success and mitigate fraud in nonprofit organizations.
Honesty and loyalty. Honesty and loyalty are critical attitudes that managers
must promote to increase stakeholders’ satisfaction (Ferrell, Harrison, Ferrell, & Hair,
2019). Honesty and loyalty are the primary factors that contribute to increasing trust and
satisfaction between organization leaders and employees (Parmar, Keevil, & Wicks,
2019). P1 and P3 stated that increasing honesty and loyalty led to transparency and fraud
prevention. P3 added that “We disclose in our monthly report all financial expenditures
and receipts to promote honesty and increase employees’ loyalty.” Moreover, P2 and P4
noted that building trust increased confidence, and employees feel free to ask questions or
suggest new ideas that could contribute to promoting ethical value and mitigate fraud. For
example, P2 stated that “We realize that a strong board of directors with transparency,
oversight, and accountability sets the tone and is the first defense against fraud.” P4 also
echoed that “We believe that being honest and loyal to the organization we work for is
crucial to build a strong relationship between employees and employers.” Based on the
fraud triangle theory, honesty and loyalty are critical factors for improving business
practices and preventing fraud (Hui, Chih-Wen, & Yi-Han, 2015).
77
Stakeholders’ attitudes and behaviors. Nonprofit organization leaders should
promote good governance to increase trust among stakeholders and mitigate fraud
(Dzomira, 2014). Nonprofit leaders or managers have the mission to assess employees’,
donors’, and government officials’ attitudes and behaviors to their organizations to
ensure the credibility of the organization when collecting and managing funds or
providing services to customers (Dzomira, 2014), which the findings from the interviews
aligned with (see Table 2). P2 and P4 reported that analyzing behaviors enabled their
companies to understand the impact of fraud on the organization’s success. P2 added that
“We use a short monthly survey to encourage stakeholders’ feedbacks to better learn and
understand their needs and improve the quality of our services.” P2 and P4 argued that
listening with attention to stakeholders allowed their companies to increase financial
resources, promote customer service, improve service quality, and detect fraud. P1, P2,
and P4 suggested that increasing transparency among stakeholders when presenting
financial reports and other business activities is critical to increase trust and motivate
their feedbacks about fraudulent behaviors. Promoting, for example, transparency, can
mitigate fraud because fraudsters would not have the pressure, opportunity, or
rationalization to commit fraudulent behaviors once the organization leaders make
information public (Pollman, 2020). Based on the tenets of the fraud triangle theory,
promoting stakeholders’ positive attitudes, customer service, and service quality for
increasing the well-being of people in the local communities is crucial to gathering
information that could lead to mitigating fraud.
78
Table 2
Ethics and Regulations Compliance
Nodes/Themes
Number of
participants Participant engagement (%)
Honesty and loyalty 4 100
Stakeholders’ attitude and
behavior 3 75
Theme 2: Transformational Leadership Style
The second emergent theme was a transformational leadership style.
Transformational leadership leads to integrate all followers as a part of the organization,
and its direct or indirect psychological impacts on employees are important to promote
job satisfaction (Peng, Liao, & Sun, 2020). Additionally, based on the fraud triangle
theory, promoting good communication and improving job satisfaction and
organizational justice is critical to mitigating and preventing fraudulent behaviors
(Greenwood, 2016). For example, P2 and P4 argued that the use of inspiration, empathy,
and confidence to align followers in the vision and mission of their organization
contributed to increase stakeholder’s confidence and prevent fraud. P1 echoed that, “My
role as a manager is to remind during daily meetings that we are all together for the
common goals which are success and longevity.” The findings from the participants’
interviews indicated that an appropriate transformational leadership style is essential for
hiring devoted and motivated employees to sustain the organization’s productivity and
longevity.
Further, managers who hire and train devoted employees have the chance to
promote productivity and accomplish the company’s vision and mission (Breevaart &
79
Bakker, 2018; Frieder, Wand, & Oh, 2018; Nelissen, Forrier, & Verbruggen, 2017). P2
and P3 noted that their leadership styles enabled their employees to understand the
organization’s mission and goals. For example, P3 added, “New hire orientation and
human resources reviews of the organization helped employees to understand why
organization leaders must mitigate fraud to increase donors’ satisfaction.” P1 and P2 also
stated that using background checks in the hiring process enabled the company to recruit
good and devoted employees. P2 said, “The company uses the E-Verify system to verify
job seekers information from the government database to avoid hiring illegals or
criminals.” P3 added that hiring good employees is critical to mitigating fraudulent
behaviors. P1 and P4 also argued that promoting new employee training and employee
satisfaction surveys were strategic to circumvent the rationalization to commit fraud.
Transformational leadership is a supportive managerial tool that effective
managers should use for their organization's effectiveness (Amor, Vázquez, & Faíña,
2020). Based on the tenets of the fraud triangle theory, transformational leadership is
critical for mitigating fraud by hiring and training motivated, skilled, and devoted
employees (Peng & Sun, 2020). Promoting the adaptation of change to increase
satisfaction among stakeholders should be a crucial factor that effective managers need to
mitigate fraud by promoting the denunciation of fraudulent behaviors.
Hiring and training. Employees are among the primary sources of production
and valuable assets that promote productivity. In nonprofit organizations, executive
leaders or managers need to ensure the hiring process and job training are effective to
recruit employees who will not be involved in fraudulent practices (Madura, 2015). Some
80
researchers argued that promoting employee training is strategic to increase knowledge,
skills, and adaptation to change in an organization (Nellissen, Forrier, & Verbruggen
(2017). Moreover, nonprofit CAA leaders need to be transformational leaders to increase
hiring and training practices, monitor and assess employees’ skills, identify the causes of
fraud and plan the best measures to mitigate fraud in their organizations (Madura, 2015).
The results of data analysis indicated that participants used a transformational leadership
strategy to hire and train employees to better understand business practices and the
implications of fraud in the organization.
All four participants agreed that hiring and training employees lead to promoting
business practices and fraud prevention. Three out of four participants indicated that their
strategies to work as a team to guide the change through their inspiration contributed to
use for instance managerial software and the Internet to hire the best employees, planned
organizational planning, and monitor organization activities in real-time. P1, P3, and P4
presented their training plan and budget to ensure their commitment to training activities.
P2 and P4 also presented their strategy to use background and drug tests to ensure the
quality and morality of new hires. Moreover, P3 added that “We prefer and encourage
hiring employees locally because it is easier for the company to verify the credentials of a
local employee.” Based on the tenets of the fraud triangle theory, it becomes clear that
bad employees may commit fraud (Greenwood, 2016). As nonprofit organizations are
like volunteer services, managers should use transformational leadership to mitigate the
opportunity, rationalization, and incentive to commit fraud by hiring credible and vetted
people to prevent fraud.
81
Adaptation to change. In the current nonprofit organization’s workplace,
managers need to understand and adopt change. The rapid evolution of technology and
business regulations, make change irreversible to compete, increase customer service, or
act efficiently in real-time (Garba, 2017). Isal, Pikarti, Hidayanto, and Putra (2016)
argued that using for instance technology innovation allows managers to assess controls,
inventories, any other business activities at a low cost, and prevent fraud. The findings
from interviews aligned with Isal et al.’s statement and indicated that participants used
adaptation to change strategy to reduce fraudulent behaviors (see Table 3). P1, P3, and
P4 noted that adopting changes in dealing with fraudulent practices had a positive impact
on mitigating fraud. P1 stated that “The organization used an automated control
electronic system to monitor all agency materials and increase fraud prevention and
detection at any time.” P3 added, “Using new technology enabled to monitor actual
budget vs financial performance and oversee the reserve of funds in real-time.” Based on
the tenets of the fraud triangle theory, adaptation to change in nonprofit organizations is
crucial to detect and prevent fraudulent behaviors.
Table 3
Transformational Leadership Style
Nodes/Themes
Number of
participants Participant engagement (%)
Hiring and training 4 100
Adaptation to change 3 75
82
Theme 3: Managerial Skills
The third emergent theme was managerial skills. Managerial skills sub-themes
were business skills, experiences, and understanding of business practices. According to
the fraud triangle theory, managers and organization leaders should have the capability
and ability to efficiently lead an organization (Suryandari, Yuesti, & Suryawan, 2019).
Gordian and Evers (2017) echoed that the role of effective leaders or managers is to
prevent fraud and promote success. A successful leader or manager should have
managerial skills to learn from failure, experience, and to make flexible changes that fit
the organization’s goals. Corruption and fraud have negative impacts on organization
success, and managers should have efficient managerial tools such as technology
innovation, internal and external controls, and periodic business evaluation to improve
transparency and prevent fraud (Gordian & Evers, 2017).
The results of data analysis indicated that participants used their knowledge,
experience, and skills to monitor business activities, analyze customers’ behaviors, and
mitigate fraud. The theme management skills emerged from interview questions 4, 5, and
6, in which participants explained strategies they used to circumvent pressure,
opportunity, and rationalization for employees to commit fraud. The theme management
skills aligned with the fraud triangle theory because managers must understand business
practices before planning strategies to improve management weaknesses or detect fraud.
All four participants affirmed that the fraud triangle theory included critical elements
related to management skills. For example, P1 stated, “Using audit and organizational
skills contributed to complete the IRS Form on time and correctly, and also conduct the
83
performance appraisal of the CEO/Executive director within each calendar year.” P2 and
P3 used their managerial skills to improve employees’ payroll and track employees’
attendance every day by using for instance Raiser’s Edge software. P1 and P4 added that
using internal and external audits regularly allowed the organization to identify financial
data misalignment. P1 added, “The organization conducts an annual audit, which is
completed by a certified public accountant on time in accordance with Title 2 of the Code
of Federal Regulations, …and the organization’s auditor presents the audit findings to the
governing board.” Previous authors argued that managers or leaders should have a basic
understanding of business operations and regulations to reach success (Lynch, 2016). All
participants suggested increasing internal and external audit practices is paramount to
increase transparency and detect fraud. The findings were substantial with the
requirement to use management skills as a strategic tool to mitigate fraud in nonprofit
organizations.
Business skills and experience. Participants agreed that business knowledge,
experience, and skills were among the factors that contributed to identify, prevent, and
mitigate fraud (see Table 4). Mlambo, Mubecua, Mpanza, and Mlambo (2019) argued
that a successful leader or manager must have business skills such as competency,
problem-solving capability, adaptability, self-direction, initiative spirit, critical thinking,
innovative skills, and communication skills. P1 and P2 noted that their business skills
and experience were critical to promote financial activities and prevent fraud. P2 added
that “My personal experience of working for many years as a manager and business skills
acquired from my education helped me to implement an effective internal control form
84
any input to output activities.” P1 and P4’s statements aligned with the findings of
Bennett and Hatfield (2018). Bennett and Hatfield noted that nonprofit leaders, including
pastors and religious leaders, should have audits skills and experience to ensure that
financial controls and fraud prevention are adequate. P1 added that “My experience of
dealing with auditors contributed to understanding the implications of audit findings on
organizational success.” Moreover, P2 and P4 echoed that their business skills and
experience of working for many years in a nonprofit organization enabled them to be
aware of fraudulent practices and use his knowledge and skills to prevent fraud at all
business levels of activities. As stated by Ho and Mallick (2017) having and using
business skills and experiences is paramount to mitigate fraud in nonprofit organizations
and meet organizational goals. Based on the fraud triangle theory, having managerial and
business skills will be crucial for managers to prevent and mitigate fraud in nonprofit
organizations.
Understanding business practices. Business operations or practices are
operational activities that contribute to promoting organization success (Gottschalk,
2016). Per Gottschalk, controlling donor funds, grants, and fundraising in receipts and
expenses is an important business practice that should always be maintained in nonprofit
organizations to assess risk management and prevent accounting irregularities. P1 and P4
stated that understanding business practices is critical to detect fraudulent behaviors and
prevent financial losses. P4 added that “My business background and profile allowed me
to plan in advance employee meetings, materials acquisitions, funds collections, seminars
with donors, and government grants collection.” Moreover, because of financial
85
constraints, P2 and P3 used business practices to regularly permutate employees at some
positions to allow them to learn and understand each position and be aware of the impact
of fraud. This strategy aligned with the fraud triangle theory and the analysis of
McDonnell and Rutherford (2018), who argued that understanding business practices is
crucial to promote positive organizational behaviors and contribute to increasing
stakeholders’ satisfaction.
Table 4
Managerial Skills
Nodes/Themes
Number of
participants Participant engagement (%)
Business skills and experience 3 75
Understanding business practices 4 100
The overall findings of this qualitative multiple case study aligned with the
literature review and the conceptual framework of the fraud triangle theory. The results
revealed that using honesty and loyalty, transformational leadership style, and managerial
skills strategies was crucial and strategic for top nonprofit leaders to mitigate fraudulent
behaviors in their organizations. Nonprofit managers or leaders may have different views
and strategies about mitigating fraudulent behaviors; however, finding appropriate
strategies is crucial to prevent fraud and ensure organization longevity. Nonprofit leaders
or managers who are struggling to improve transparency, increase productivity, and
mitigate fraud should explore the advantages of using the fraud triangle theory and the
results of this study to understand the impacts of fraudulent behaviors, detect and prevent
fraud, and promote their organizations’ success.
86
Applications to Professional Practice
The purpose of this research study was to explore strategies nonprofit CAA
executive leaders use to reduce fraudulent financial activities. The findings of this
research were appropriate for understanding the causes and impacts of fraud in nonprofit
organizations located in Maryland. According to Nanduri, Jia, Oka, Beaver, and Liu
(2020), business leaders or managers need effective strategies to mitigate fraud and
ensure long-term success. Using a qualitative multiple case study with semistructured
interviews and document analysis; I conducted interviews with four top executive leaders
of nonprofit CAAs located in Maryland. I found three primary themes and six sub-themes
using NVivo 12 coding and data analysis. The primary themes consisted of (a) ethics and
regulatory compliance, (b) transformational leadership style, and (c) managerial skills.
The sub-themes consisted of (a) honesty and loyalty, (b) stakeholders’ satisfaction, (c)
hiring and training, (d) adaptation to change, (e) business skills and experience, and (f)
understanding business practices. Managers or leaders of nonprofit organizations should
build their strategies based on the findings of this study to prevent and mitigate fraudulent
behaviors. As stated by Omair and Alturki (2020), fraud affects an organization in
different aspects, and it should be understood in its context of time, location, resources,
and function to better mitigate it. Based on the fraud triangle theory, the attitudes and
characteristics of nonprofit leaders are crucial to effectively prevent and mitigate fraud
within an organization (Cressey, 1953).
Data collected from interviews indicated that fraud in nonprofit organizations is
becoming a critical business concern for managers to promote business credibility and
87
sustainability. Moreover, combining ethics and regulatory compliance with honesty and
loyalty and stakeholders’ attitudes is strategic to motivate managers to build trust and
increase confidence among partners. Saha, Cerchione, Singh, and Dahiya (2020) echoed
that to promote business performance, organizational managers should promote ethical
leadership and corporate social responsibility. Using a transformational leadership style
with effective hiring and training and adaptation to change is crucial for managers to
involve all partners or stakeholders to adhere to the organization’s mission and vision.
Further, using managerial skills with strategic business experience and the ability to
understand business practices is also critical and constructive for organization
development. Nonprofit managers or leaders can use the findings of this study to prevent
fraud and predict a better future of their organization. The findings are also practical
solutions for nonprofit leaders or managers who are struggling to mitigate fraud and
improve management leadership. Top managers or executive leaders might also identify
effective business strategies to improve internal controls, organizational changes, and
monitoring business operations that provide oversight and enhancement of service
deliverables while avoiding the loss from fraudulent activities (Sibanda, Zindi, &
Maramura, 2020).
Implications for Social Change
The implications for positive social change include the potential for nonprofit
executive leaders or managers to develop processes and procedures that advocate for
better policies, strategies to reduce fraudulent financial activities, promote corporate
responsibility, and influence the performance and positive outcomes of business
88
activities. Fraud affects organization success, and failure to mitigate or ban fraud could
affect organization viability. The viability of a nonprofit organization may also have
many impacts on other stakeholders such as donors, employees, and government officials
to promote other social activities in the local communities (Lueg & Radlach, 2016). Per
Lueg and Radlach (2016), leaders who catalyze the development and sustainability of
social programs such as education could promote employees, families, and all the
community members’ satisfaction. To promote social change, Lee (2018) encouraged
organization leaders to promote social activities that may generate positive economic
value and contribute to improving the well-being of the local community members. The
findings of this study could also help nonprofits leaders of the community action agencies
to improve the success of programs such as Head Start, tax returns preparation, adults and
children literacy in local communities, and other social services.
Recommendations for Action
Nonprofit business scandals and other fraudulent acts negatively affect
organizational functioning, service delivery, and board governance (Zona, Minoja, &
Coda, 2013). Kummer et al. reported that nonprofit organization fraud cases increased by
20% in the United States between 2010 to 2015, which amounted to about $40 billion of
lost revenue each year. Per Kummer et al., the high rate of fraudulent acts or behaviors
affect organization reputation, productivity, and survivability. Ge et al. echoed that
understanding the impacts of fraud on nonprofit organizations helps to increase
organization long-term financial value and reduces the negative image of the organization
by donors, government officials, and community members. Mitigating fraud makes
89
organizations resilient, so organization leaders will be able to plan and sustain
organization longevity and increase social program activities (Gordian & Evers, 2017).
The findings from this study indicated that for nonprofit leaders to promote their
social programs, they need to comply with ethical values and business regulations, use a
transformational leadership style to unify employees for the same vision, and have
management skills to promote and control effectively their business activities. These
three recommendations should be beneficial for nonprofit leaders or managers who are
struggling to mitigate fraud and potential small business entrepreneurs who are planning
to launch new nonprofit businesses. All participants agreed that ethical values and
regulatory compliance have a positive impact on detecting and mitigating fraud. I
recommend compliance with ethics and regulations to increase trust and transparency
between leaders and employees. Second, to motivate employees, nonprofit organization
leaders must use a transformational leadership style and have managerial skills to lead
efficiently. As described by Cressey (1953), mitigating fraud is critical for improving
organizational performance and sustainability. The results of this study indicated that
nonprofit organization leaders who used their managerial skills have the chance to
prevent and reduce fraudulent behaviors in their organizations.
The findings of this study are crucial to nonprofit managers or leaders to sustain
productivity and longevity by mitigating fraudulent behaviors. I recommend scholars,
business analysts, researchers, small nonprofit organizations owners, small business
leaders, managers, entrepreneurs, and government agencies leaders to promote the
findings of this study by organizing academic and business conferences and business
90
forums to promote the perception and impacts of fraud in organizations. As my research
will be available in the ProQuest database for scholar researchers and students to review,
I will disseminate my study by preparing and providing a one- or two-page summary of
my research findings and recommendations to all participants. I will contact local
schools, churches, Small Business Administration, and the Nonprofit Organization
Association to organize conferences and present my findings. I will also publish my
research in the local journal to reach other organizations or people who will be interested
in my study.
Recommendations for Further Research
The participants in this study included only nonprofit leaders located in Maryland,
and who have been in business for more than 5 years. The primary limitations of this
study resulted from the (a) limited number of interview participants that could provide a
lack of perspectives on the topic of fraudulent financial activities, (b) the design of the
case study selected to conduct the study, and (c) focus of conducting interviews with
participants with the responsibility of organizational administration and the
implementation of internal control measures to provide strategies to reduce fraudulent
financial activities in CAAs. For further research, I recommend expanding the sample
size and qualifications to explore strategies nonprofit organization leaders or managers
use to mitigate fraud, as well as in other small business industries. Secondly, I
recommend researchers use different research methodologies and designs to collect and
analyze the impact of fraud on nonprofit and profit organizations to increase business
policies and practices. Finally, future researchers should explore the impact of fraud on
91
organizations by collecting data from those who are not in the top managerial positions,
such as cashiers, accountants, controllers, and mid-managers to receive another
perceptive of their experience and phenomenon.
Reflections
The long DBA study process was a great learning experience. I gained knowledge
and research tools from writing literature reviews and performing data analysis,
especially about fraud in nonprofit organizations. The purpose of my doctoral journey at
Walden University was to become a real promotor of positive social change. The analysis
and impact of fraudulent behaviors in nonprofit organizations were crucial to learn and
understand effective business strategies that lead to fraud prevention and promotion of
organization productivity and longevity. Moreover, as a novice scholar-practitioner, it
was challenging to identify and mitigate research biases and deal with some participants
who were top organization leaders. Some participants were reserved about providing
some confidential documents because they thought I would exploit them for other
purposes.
Despite all these challenges, I complied with the IRB policies and was able to
conduct and collect the information needed for my study. The findings of this research
allowed me to understand nonprofit leaders’ strategies used to mitigate fraudulent
behaviors and that promoted organization sustainability. The findings could also be
beneficial for small nonprofit organization owners, entrepreneurs, current nonprofit
leaders or managers, government agency leaders, and academic researchers or scholars. I
certainly also believe that the results of this research study are crucial and useful for other
92
organizations such as church leaders to understand the motivation for an individual to
commit fraud. Furthermore, the findings of this study have increased my interest to
become a consultant for nonprofit organizations.
Conclusion
Nonprofit CAAs have a mission to promote social change and economic
development. The high rate of fraud in nonprofit organizations affects the viability of the
business. The pressure, rationalization, and opportunity of the individual to commit fraud
have increased in both profit and nonprofit organizations and affect organizational
productivity. Nonprofit organization leaders in the CAAs need strategies to reduce or
mitigate fraudulent practices to promote organizational success and sustainability. The
purpose of this research was to explore strategies nonprofit leaders use to mitigate
fraudulent behaviors in their organizations. Understanding the impact of the fraud
triangle theory promotes awareness about fraudulent practices in organizations, ensures
organization success, and increases confidence among donors, employees, and
government agency leaders. Preventing fraudulent behaviors contributes to ensure long-
term financial goals.
Fraudulent practices have become more visible in the current business context
because of the pressure, rationalization, and opportunity that individuals have.
Consequently, using Cressey’s fraud triangle theory, the findings of this study indicated
that managers or leaders of nonprofit organizations must implement their strategies to
mitigate fraud at all business levels and should involve all stakeholders in meeting
organization goals and accomplishing organization mission. Cressey’s fraud triangle
93
theory does not only provide strategies to detect and analyze fraud, but also provide
crucial strategies to avoid, prevent, and eliminate fraud to increase business performance.
Nonprofit organization leaders should understand business practices and managerial tools
to develop effective strategies to sustain their organization for the long-term.
The findings of this study revealed three major effective strategies nonprofit
organization leaders use for mitigating fraudulent behaviors in their organizations. The
effective three strategies focused on: (a) complying with ethics and regulations to
promote transparency in doing his job at any time at work, (b) using transformational
leadership to lead efficiently followers and motivate employees to meet organization
vision and mission, and (c) using managerial skills to preserve organization assets,
promote organization success, and increase the organization’s value and image. Current
nonprofit managers or leaders who are struggling to mitigate fraud, academic researchers,
and scholars, potential entrepreneurs, and government agency leaders can use the
findings of this study to learn and understand the impact of fraudulent practices on
organizations. The findings may also be constructive to implement business policies or
strategies to sustain organizational success and longevity. Further, the findings may
contribute to promote a positive social change by supporting the success of programs
such as Head Start, tax preparation, adults and children education, and enhancing the
economic development for the local communities.
94
References
Abdullahi, R., & Mansor, N. (2015a). Concomitant debacle of fraud incidences in the
Nigerian public sector: Understanding the power of fraud triangle theory.
International Journal of Academic Research in Business and Social Sciences, 5,
312-326. doi:10.6007/IJARBSS/v5-i5/1641
Abdullahi, R., & Mansor, N. (2015b). Fraud triangle theory and fraud diamond theory.
Understanding the convergent and divergent for future research. International
Journal of Academic Research in Accounting, Finance, and Management
Sciences, 5(4), 38-45. doi:10.6007/IJARAFMS/v5-3/1823
Adelstein, J., & Clegg, S. (2016). Code of ethics: A stratified vehicle for compliance.
Journal of Business Ethics, 138(1), 53-66. doi:10.1007/s10551-015-2581-9
Ahiabor, G., & Mensah, C. C. Y. (2013). Effectiveness of internal control on the finances
of churches in greater Accra, Ghana. Research Journal of Finance and
Accounting, 4(13), 1-7. doi:10.1.1.872.321&rep
Akcura, E. (2015). Mandatory versus voluntary payment for green electricity. Ecological
Economics, 116, 84-94. doi:10.1016/j.ecolecon.2015.02.027
Akeem, L. B. (2015). The impact of auditing in controlling fraud and other financial
irregularities. International Journal of Empirical Finance, 4, 147-164. Retrieved
from http://ideas.repec.org/
Alali, F., Sophia, I., & Wang, L. (2017). Characteristics of financial restatements and
frauds: An analysis of corporate reporting quality from 2000–2014. The CPA
Journal, 87(11), 32-41. Retrieved from https://www.cpajournal.com/
95
Albrecht, W. S., & Hoopes, J. L. (2014). Why audits cannot detect all fraud? Cover story.
CPA Journal, 84(10), 12-21. doi:10.2134/ssrn.1019354
Albrecht, C., Turnbull, C., Zhang, Y., & Skousen, C. J. (2010). The relationship between
South Korean chaebols and fraud. Management Research Review, 33, 257-268.
doi:10.1108/01409171011030408
Alferjany, A. A. M., Salama, A. A., Amuna, Y. M. A., Al Shobaki, M. J., & Naser, S. S.
A. (2018). The relationship between correcting deviations in measuring
performance and achieving the objectives of control-The Islamic University as a
model. International Journal of Engineering and Information Systems (IJEAIS),
2(1), 74-89. Retrieved from https://hal.archives-ouvertes.fr/hal-01695427
Ammar, A. A. (2017). Factors influencing intention to adopt mobile banking in Sudanese
microfinance sector (Doctoral dissertation). Retrieved from ProQuest
Dissertations and Theses databases. (UMI No. 10975643)
Amor, A. M., Vázquez, J. P. A., & Faíña, J. A. (2020). Transformational leadership and
work engagement: Exploring the mediating role of structural
empowerment. European Management Journal, 38, 169-178.
doi:10.1016/j.emj.2019.06.007
Appiah, E. A. (2015). Exploring the perceptions of Northern Virginia accountants on
internal control weaknesses resulting in accounting fraud (Doctoral dissertation).
Retrieved from ProQuest Dissertations and Theses database. (UMI No. 3745271)
Archambeault, D. S., Webber, S., & Greenlee, J. (2015). Fraud and corruption in US
nonprofit entities: A summary of press reports 2008-2011. Nonprofit and
96
Voluntary Sector Quarterly, 44, 1194-1224. doi:10.1177/0899764014555987
Archibald, P. C., Daniels, K., & Sinclair, M. (2017). Social work analysis of social
change reflecting renewed plans for effective urban community policing in
Baltimore City. Urban Social Work, 1(1), 5-19. doi:10.1891/2474-8684.1.1.5
Arend, R. J., Sarooghi, H., & Burkemper, A. (2015). Effectuation as ineffectual:
Applying the 3E theory-assessment framework to a proposed new theory of
entrepreneurship. Academy of Management Review, 40, 630-651.
doi:10.5465/amr.2014.0455
Arlow, J. A. (2018). Fantasy, memory, and reality testing. The Psychoanalytic Quarterly,
87, 127-148. doi:10.1080/00332828.2018.1424443
Arshad, R., Razali, W. A., & Bakar, N. A. (2015). Catch the warning signals. The fight
against fraud and abuse in non-profits organizations. Procedia Economics and
Finance, 28, 114-120. doi:101016/S2212-5671(15)01089-8
Association of Certified Fraud Examiners. (2016). Report to the nations on occupational
fraud and abuse. Retrieved from http://www.acfe.com/rttn/docs/2016-report-to-
nations
Astuti, S., Zuhrohtun, T., & Kusharyanti, S. (2015). Fraudulent financial reporting in
Public companies in Indonesia: An analysis of fraud triangle and responsibilities
of auditors. Journal of Economics, Business, and Accountancy Ventura,18, 283-
290. doi:10.14414/jebav.v18i2.454
Baker, J. D. (2016). The purpose, process, and methods of writing a literature review.
AORN Journal, 103, 265-269. doi:10.1016/j.aorn.2016.01.016
97
Bengtsson, M. (2016). How to plan and perform a qualitative study using content
analysis. NursingPlus Open, 2(1), 8-14. doi:10.1016/j.npls.2016.01.001
Bennett, G. B., & Hatfield, R. C. (2018). Staff auditors’ proclivity for computer-mediated
communication with clients and its effect on skeptical behavior. Accounting,
Organizations and Society, 68(1), 42-57. doi:10.1016/j.aos.2018.05.003
Bernard, H. R., & Ryan, G. W. (2016). Analyzing qualitative data (2nd ed.). Thousand
Oaks, CA: Sage.
Bevan, M. T. (2014). A method of phenomenological interviewing. Qualitative Health
Research Journal, 24, 136-144. doi:10.1177/1049732313519710
Bhasin, M. L. (2013). Corporate accounting fraud: A case study of Satyam Computers
Limited. Open Journal of Accounting, 2(1), 26-38. doi:10.4236/ojacct.2013.22006
Bhasin, M. L. (2016). The fight against bank frauds: Current scenario and future
challenges. Ciencia e Tecnica Vitivinicola Journal, 31(2), 56-85. Retrieved from
https://www.researchgate.net/publication/293826014
Biglow, J. (2016). It stands to reason: An argument for Article III standing based on the
threat of future harm in data breach litigation. Minnesota Journal of Law, Science,
and Technology, 17, 944-974. Retrieved from http://scholarship.law.umn.edu/
Bin, A. S. (2015). The relationship between job satisfaction, job performance, and
employee engagement: An explorative study. Issues in Business Management and
Economics, 4(1), 1-8. doi:10.15739/IBME.16.001
Bird, R., & Davis-Nozemack, K. (2018). Tax avoidance as a sustainability problem.
Journal of Business Ethics, 151, 1009-1025. doi:10.1007/s10551-016-3162-2
98
Birt, L., Scott, S., Cavers, D., Campbell, C., & Walter, F. (2016). Member checking: A
tool to enhance trustworthiness or merely a nod to validation? Qualitative Health
Research, 26, 1802-1811. doi:10.1177/1049732316654870
Bishop, C. C., Hermanson, D. R., & Riley, R. A., Jr. (2017). Collusive fraud: Leader,
incident, and organizational characteristics. Journal of Forensic Accounting
Research, 2(1), 49-70. doi:10.2308/jfar-51826
Black, E. L., Christensen, T. E., Kiosse, P. V., & Steffen, T. D. (2017). Has the regulation
of Non-GAAP disclosures influenced managers’ use of aggressive earnings
exclusions? Journal of Accounting, Auditing & Finance, 32, 209-240.
doi:10.1177/0148558X15599131
Bošković, M. Ž. (2017). Workforce motivation as a factor of productivity. TEME:
Casopis Za Društvene Nauke, 41, 503-516. doi:10.22190/TEME1702503Z
Brauer, C. M. (1982). Kennedy Johnson and the war on poverty. The Journal of
Academic History, 69(1), 98-119. doi:10.2307/1887754
Breevaart, K., & Bakker, A. B. (2018). Daily job demands and employee work
engagement: The role of daily transformational leadership behavior. Journal of
Occupational Health Psychology, 23, 338-349. doi:10.1037/ocp0000082
Bromley, E., Mikesell, L., Jones, F., & Khodyakov, D. (2015). Framing health matters.
from subject to participant: Ethics and the evolving role of community in health
research. American Journal of Public Health, 105, 900-908.
doi:10.2105/AJPH.2014.302403
Brooks, J. S., & Normore, A. H. (2015). Qualitative research and educational leadership:
99
Essential dynamics to consider when designing and conducting studies.
International Journal of Educational Management, 29, 798-806.
doi:10.1108/IJEM-06-2015-0083
Brown, J. O., Hays, J., & Stuebs Jr, M. T. (2016). Modeling accountant whistleblowing
intentions: Applying the theory of planned behavior and the fraud triangle.
Accounting and the Public Interest, 16(1), 28-56. doi:10.2308/apin-51675
Burnes, D., Henderson Jr, C. R., Sheppard, C., Zhao, R., Pillemer, K., & Lachs, M. S.
(2017). Prevalence of financial fraud and scams among older adults in the United
States: A systematic review and meta-analysis. American Journal of Public
Health, 107(8), 13-21. doi:10.2105/AJPH.2017.303821
Cabral, S., Mahoney, J. T., McGahan, A. M., & Potoski, M. (2019). Value creation and
value appropriation in public and nonprofit organizations. Strategic Management
Journal, 40, 465-475. doi:10.1002/smj.3008
Callahan, J. L. (2014). Writing literature reviews: A reprise and update. Human Resource
Development Review, 13, 271–275. doi:10.1177/1534484314536705
Camfferman, K., & Wielhouwer, J. L. (2019). 21st-century scandals: Towards a risk
approach to financial reporting scandals. Accounting and Business Research, 49,
503-535. doi:10.1080/00014788.2019.1614267
Cao, M., Chychyla, R., & Stewart, T. (2015). Big Data analytics in financial statement
audits. Accounting Horizons, 29, 423-429. doi:10.2308/acch-51068
Caretta, M.A. (2016). Member checking: A feminist participatory analysis of the use of
preliminary results pamphlets in cross-cultural, cross-language research.
100
Qualitative Research, 16, 305-318. doi:10.1177/1468794115606495
Carroll, W., & Huxtable, D. (2014). Expose, oppose, propose: The Canadian center for
policy alternatives and the challenge of alternative knowledge. Labour / Le
Travail, 74(1), 27-50. Retrieved from http://muse.jhu.edu
Carver, C. L., Klein, S. C., & Gistinger, A., M. (2015). What’s under your bed? A
fundraising fiasco. Journal of Cases in Educational Leadership, 18, 157-166.
doi:10.1177/1555458915584678
Castillo-Montoya, M. (2016). Preparing for interview research: The interview protocol
refinement framework. The Qualitative Report, 21, 811-831. Retrieved from
http://www.nova.edu/ssss/QR/index.html
Celik, H. (2016). Customer online shopping anxiety within the Unified Theory of
Acceptance and Use Technology (UTAUT) framework. Asia Pacific Journal of
Marketing and Logistics, 28, 278-307. doi:10.1108/APJML-05-2015-0077
Chan, C., & Ananthram, S. (2019). Religion-based decision making in Indian
multinationals: A multi-faith study of ethical virtues and mindsets. Journal of
Business Ethics, 156, 651-677. doi:10.1007/S10551-017-3558-7
Chen, J., D., Hou, W., & Lee, E. (2013). Executive integrity, audit opinion, and fraud in
Chinese listed firms. Emerging Markets Review, 15, 72-91.
doi:10.1016/j.ememar.2012.12.003
Chien, W. C., & Hassenzahl, M. (2017). Technology-mediated relationship maintenance
in romantic long-distance relationships: An autoethnographic research through
design. Human-Computer Interaction, 0(0), 1-48.
101
doi:10.1080/07370024.2017.1401927
Chilton, B. S., Foyou, V. E., & King, S. M. (2018). Moral readings of the court:
Discrimination cases in the US Supreme Court. Public Integrity, 20(6), 571-594.
doi:10.1080/10999922.2018.1433423
Chima, C. C., Obiah, M. E., & Linda, O. N. (2018). Internal control and responsibility
accounting in corporate governance of Nigerian organizations. Journal of
Accounting and Financial Management, 4(8), 32-42. Retrieved from
http://iiard.com/
Church, B. K., Jenkins, J. G., & Stanley, J. D. (2018). Auditor independence in the
United States: Cornerstone of the profession or thorn in our side? Accounting
Horizons, 32, 145-168.doi:10.2308/acch-52122
Cope, D. G. (2014). Methods and meanings: Credibility and trustworthiness of qualitative
research. Oncology Nursing Forum, 41(1), 89-91. doi:10.1188/14.ONF.89-91
Cressey, D. R. (1950). The criminal violation of financial trust. American Sociological
Review, 15, 738 -743. doi:10.2307/2086606
Cressey, D. R. (1953). Other people’s money: A study in the social psychology of
embezzlement. New York, NY, US: Free Press.
Cumming, D., Hou, W., & Lee, E. (2016). Business ethics and finance in greater China:
Synthesis and future directions in sustainability, CSR, and fraud. Journal of
Business Ethics, 138(4), 601-626. doi:10.1007/s10551-016-3288-2
Cunliffe, A. L., & Alcadipani, R. (2016). The politics of access in fieldwork: Immersion,
backstage dramas, and deception. Organizational Research Methods, 19, 535-
102
561. doi:10.1177/1094428116639134
Daniel, J. H. (2016). Constitution: Making in the shadow of empire. American Journal of
Legal History, 56(1), 84-91. doi:10.1093/ajlh/njv020
Dasgupta, M. (2015). Exploring the relevance of case study research. Vision, 19, 147-
160. doi:10.1177/0972262915575661
Davis, A. K., Guenther, D. A., Krull, L. K., & Williams, B. M. (2015). Do socially
responsible firms pay more taxes? The Accounting Review, 91(1), 47-68.
doi:10.2308/accr-51224
Dellaportas, S. (2013). Conversations with inmate accountants: Motivation, opportunity
and the fraud triangle. Accounting Forum, 37(1), 29-39.
doi:10.1016/j.accfor.2012.09.003
Deslatte, A., Schatteman, A. M., & Stokan, E. (2019). Handing over the keys: Nonprofit
economic development corporations and their implications for accountability and
inclusion. Public Performance & Management Review, 42(1), 90-114.
doi:10.1080/15309576.2018.1441726
Desmond, C., & Casale, D. (2017). Catch-up growth in stunted children: Definitions and
predictors. PLoS ONE, 12(12), 12-25. doi:10.1371/journal.pone.0189135
Dong, W., Liao, S., & Zhang, Z. (2018). Leveraging financial social media data for
corporate fraud detection. Journal of Management Information Systems, 35, 461-
487. doi:10.1080/07421222.2018.1451954
Downe, J., Cowell, R., & Morgan, K. (2016). What determines ethical behavior in public
organizations: Is it rules or leadership? Public Administration Review, 76, 898-
103
909. doi:10.1111/puar.12562%4010.1111
Drábková, Z. (2018). Fraud risk management from the perspective of CFEBT risk
triangle of accounting errors and frauds. Acta Universitatis Agriculturae et
Silviculturae Mendelianae Brunensis, 66, 1261-1266.
doi:10.11118/actaun201866051261
Dumay, J., La Torre, M., & Farneti, F. (2019). Developing trust through stewardship:
Implications for intellectual capital, integrated reporting, and the EU Directive
2014/95/EU. Journal of Intellectual Capital, 20(1), 11-39. doi:10.1108/JIC-06-
2018-0097
Dzomira, S. (2014). Internal controls and fraud schemes in not-for-profit organizations: A
guide for good practice. Research Journal of Finance and Accounting, 5(2), 1-9.
Retrieved from https://www.iiste.org/
Ekhomu, G. O. (2015). The impact of financial literacy competencies in faith-based
organizations: A multiple case study of independent churches in the Midwestern
USA (Doctoral dissertation). Retrieved from ProQuest Dissertation and Theses
database. (UMI No. 3741495)
Elson, R. J., & Ingram, P. (2018). Wells Fargo and the unauthorized customer accounts:
A case study. Global Journal of Business Pedagogy, 2, 124-145. Retrieved from
https://www.igbr.org/
Evans, J. (2017). A working definition of moral progress. Ethical Theory Moral Practice,
20(1), 75–92. doi:10.1007/s10677-016-9753-2
Ferrell, O. C., Harrison, D. E., Ferrell, L., & Hair, J. F. (2019). Business ethics, corporate
104
social responsibility, and brand attitudes: An exploratory study. Journal of
Business Research, 95, 491-501. doi:10.1016/j.jbusres.2018.07.039
Free, C., & Murphy, P. R. (2015). The ties that bind: The decision to co-offend in fraud.
Contemporary Accounting Research, 32(1), 18–54. doi:10.1111/1911-3846.12063
Freed, M. C., Novak, L. A., Killgore, W. D., Rauch, S. A., Koehlmoos, T.P., Ginsberg, J.
P.,…& Engel, C. C. (2016). IRB and research regulatory delays within the
military health system: Do they really matter? And if so, why and for whom? The
American Journal of Bioethics, 16(1), 30-37.
doi:10.1080/15265161.2016.1187212
Frieder, R. E., Wang, G., & Oh, I.S. (2018). Linking job-relevant personality traits,
transformational leadership, and job performance via perceived meaningfulness at
work: A moderated mediation model. Journal of Applied Psychology, 103, 324-
333. doi:10.1037/apl0000274
Fusch, P. I., & Ness, L. R. (2015). Are we there yet? Data saturation in qualitative
research. Qualitative Report, 20, 1408-1416. Retrieved from http://tqr.nova.edu/
Garba, A. S. (2017). Promoting entrepreneurship amidst poverty and unemployment: The
role of Nigerian educational policies. International Journal of Asian Social
Science, 7, 684-695. doi:10.18488/journal.1.2017.78.684.69
Ge, W., Koester, A., & McVay, S. (2017). Benefits and costs of Sarbanes-Oxley Section
404 (b) exemption: Evidence from small firms’ internal control disclosures.
Journal of Accounting and Economics, 63, 358-384.
doi:10.1016/j.jacceco.2017.01.001
105
Girgenti, R. H., & Hedley, T. P. (Eds.). (2016). The new era of regulatory enforcement.
New York, NY: McGraw-Hill.
Goetz, B. (2017). On the frontlines of the welfare state (1st ed.). New York: Routledge
Gordian, M., & Evers, J. (2017). Reducing the risk of noncompliance.
Pharmaceutical Executive, 37(2), 30-31. Retrieved from
http://www.pharmexec.com/
Goreva, N., Luther, E., & Bromall, G. (2013). Exploring accounting information systems
and embezzlement from nonprofit organizations. Issues in Information Systems,
14(2), 39-46. Retrieved from https://pdfs.semanticscholar.org/
Goss, K. A., Barnes, C., & Rose, D. (2019). Bringing organizations back in: Multilevel
feedback effects on individual civic inclusion. Policy Studies Journal, 47, 451-
470. doi:10.1111/psj.12312
Gottschalk, P. (2016). Fraud examiners in financial crime investigations: The case of
Save the Children in Bangladesh. Pakistan Journal of Criminology, 8 (2), 1 -12.
Retrieved from http://hdl.handle.net/
Greenwood, M. (2016). Approving or improving research ethics in management journals.
Journal of Business Ethics, 137, 507-520. doi:10.1007/s10551-015-2564-x
Greve, C., & Pedersen, A. R. (2017). Denmark’s master of public governance program:
Assessment and lessons learned. Teaching Public Administration, 35(1), 22-37.
doi:10.1177%2F0144739416665880
Guest, D. E. (2017). Human resource management and employee well-being: Towards a
new analytic framework. Human Resource Management Journal, 27(1), 22-38.
106
doi:10.1111/1748-8583.12139
Guetterman, T. C., Fetters, M. D., & Creswell, J. W. (2015). Integrating quantitative and
qualitative results in health science: Mixed methods research through joint
displays. The Annals of Family Medicine, 13, 554-561. doi:10.1370/afm.1865
Gupta, P. K., & Gupta, S. (2015). Corporate frauds in India–perceptions and emerging
issues. Journal of Financial Crime, 22(1), 79-103. doi:10.1108/JFC-07-2013-
0045
Haas, N. E., Van Craen, M., Skogan, W. G., & Fleitas, D. M. (2015). Explaining officer
compliance: The importance of procedural justice and trust inside a police
organization. Criminology & Criminal Justice, 15, 442-463.
doi:10.1777/1748895814566288
Hadi, M.A., & Closs, S.J. (2016). Ensuring rigor and trustworthiness of qualitative
research in clinical pharmacy. International Journal of Clinical Pharmacy, 38,
641-646. doi:10.1007/s11096-015-0237-6
Hallett, R. E., & Barber, K. (2014). Ethnographic research in a cyber era. Journal of
Contemporary Ethnography, 43, 306-330. doi:10.1177/0891241613497749
Hammersley, M. (2015). On ethical principles for social research. International Journal
of Social Research Methodology, 18, 433-449.
doi:10.1080/13645579.2014.924169
Harrison, A. (2018). The effects of media capabilities on the rationalization of online
consumer fraud. Journal of the Association for Information Systems, 19, 408-440.
doi:10.17705/1jais.00497
107
Harriss, D. J., & Atkinson, G. (2015). Ethical standards in sport and exercise science
research: 2016 update. International Journal of Sports Medicine, 36, 1121-1124.
doi:10.1055/s-0035-1565186
Haron, H., Ismail, I., & Abdul Razak, S. H. (2011). Factors influencing unethical
behavior of insurance agents. International Journal of Business and Social
Science, 2(1), 1-17. Retrieved from www.ijbssnet.com
Harvey, L. (2015). Beyond member-checking: A dialogic approach to the research
interview. International Journal of Research & Method in Education, 38(1), 23-
38. doi:10.1080/1743727X.2014.914487
Hassan, S., Nadzim, S. Z. A., & Shiratuddin, N. (2015). Strategic use of social media for
small businesses based on the AIDA model. Procedia-Social and Behavioral
Sciences, 172, 262-269. doi:10.1016/j.sbspro.2015.01.363
Head Start Information. (2017). About head start. Retrieved from
http://eclkc.ohs.acf.hhs.gov/hslc
Hess, M. F., & Cottrell Jr, J. H. (2016). Fraud risk management: A small business
perspective. Business Horizons, 59(1), 13-18. doi:10.1016/j.bushor.2015.09.005
Ho, S. J., & Mallick, S. K. (2017). Does institutional linkage of bank-MFI foster
inclusive financial development even in the presence of MF I frauds? Scottish
Journal of Political Economy, 64, 283-309. doi:10.1111/sjpe.12124
Holderness Jr., D. K., McNeal, A., Riley, R., & Wells, J. T. (2018). How the evolution of
language affects fraud risk. Journal of Accountancy, 226(2), 18-23. Retrieved
from https://www.journalofaccountancy.com/
108
Holloway, I., & Galvin, K. (2017). Qualitative research in nursing and healthcare (4th
ed.). Hoboken, NJ: Wiley-Blackwell.
Holt, T. J., & Kennedy, J. P. (2019). Technology’s influence on white‐ collar offending,
reporting, and investigation. The Handbook of White‐ Collar Crime,1, 449-468.
doi:10.1002/9781118775004.ch28
Hopper, M. K. (2017). Promoting the APS Chapter Program by sharing its history, best
practices, and how-to guide for establishing new chapters. Advances in
Physiology Education, 41(1), 1-9. doi:10.1152/advan.00122.2016
Hooper J. M., & Forneli C. M. (2010). Deterring and detecting financial reporting fraud –
a platform for action. Center for Audit Quality, Washington D.C, 1-55. Retrieved
from https://www.thecaq.org/deterring-and-detecting-financial-reporting-fraud/
Horn, M, B., Dunagan, A., & Carey, K. (2018). Rethinking the rules on federal higher-ed
spending: How can congress spur innovation while clamping down on fraud?
Education Next, 18(4), 1-7. Retrieved from https://www.educationnext.org/
Hou, J., Zhang, C., & Guo, H. (2020). How nonprofits can recover from crisis events?
The trust recovery from the perspective of causal attributions. VOLUNTAS:
International Journal of Voluntary and Nonprofit Organizations, 31(1), 71-93.
doi:10.1007/s11266-019-00176-7
Houlbrook, B. (2011). An insight into the world of mortgage fraud in the US and UK.
Housing Finance International, 25(3), 1-50. Retrieved from
http://www.housingfinance.org/
Hsu, D. K., Wiklund, J., & Cotton, R. D. (2017). Success, failure, and entrepreneurial
109
reentry: An experimental assessment of the veracity of self-efficacity and prospect
theory. Entrepreneurship Theory and Practice, 41(1), 19-47.
doi:10.1111/etap.12166
Hui, L., Chih-Wen, W., & Yi-Han, C. (2015). The empirical study of consumers’ loyalty
for display technology. Journal of Business Research, 68, 2260-2265.
doi:10.1016/j.jbusres
Hung, Y. S., & Cheng, Y. C. (2018). The impact of information complexity on audit
failures from corporate fraud: Individual auditor level analysis. Asia Pacific
Management Review, 23(1), 72-85. Retrieved from
https://www.journals.elsevier.com/asia-pacific-management-review
Hussein, A. (2015). The use of triangulation in social sciences research: Can qualitative
and quantitative methods be combined? Journal of Comparative Social Work,
4(1), 1-12. Retrieved from https://www.researchgate.net/
Hyett, N., Kenny, A., & Dickson-Swift, V. (2014). Methodology or method? A critical
review of qualitative case study reports. International Journal of Qualitative
Studies on Health and Well-Being, 9, 230-244.
doi:10.1080/08989621.2015.1127763
Ingham-Broomfield, R. (2015). A nurses’ guide to qualitative research (online).
Australian Journal of Advanced Nursing, 32(3), 34-40. Retrieved from
http://www.ajan.com.au
Inspector General. (2012). Final investigation report of sub-recipient Padakhep Manabik
Unnayan Kendra (PMUK). Bangladesh, the office of the inspector general,
110
Report No.: GF-IG-11-025. Retrieved from https://www.theglobalfund.org/
Internal Revenue Service. (2015). Examples of general fraud investigations–fiscal year
2014. Retrieved from http://www.irs.gov/uac/Examples-of-General-Fraud-
Investigations
Isal, Y., Pikarti, G., Hidayanto, A., & Putra, E. (2016). Analysis of IT infrastructure
flexibility impacts on IT-business strategic alignment. Journal of Industrial
Engineering and Management, 9, 657-683. doi:10.3926/jiem.1916
Jackson, C. S. (2017). Cybersecurity policy: Exploring leadership strategies that
influence insider compliance (Doctoral dissertation). Retrieved from ProQuest
Dissertations and Theses database. (UMI No10623113)
Jakhu, G., & Malik, P. (2017). Dilemma in antitrust enforcement: How the use of
economics can guide enforcement rules in multi-sided markets. Journal of
Antitrust Enforcement, 5, 260-275. doi:10.1093/jaenfo/jnx00
Jamshed, S. (2014). Qualitative research method-interviewing and observation. Journal
of Basic and Clinical Pharmacy, 5(4), 87-88. doi:10.4103/0976-0105.141942
Jan, C. L. (2018). An effective financial statements fraud detection model for the
sustainable development of financial markets: evidence from Taiwan.
Sustainability, 10, 513-543. doi:10.3390/su10020513
Jaroslaw, R. (2016). Entrepreneurial behavior in periods of deterioration of small firms’
condition. Entrepreneurial Business and Economics Review, 4, 139-156.
doi:10.15678/EBER.2016.040211
Jenkins, J. G., Negangard, E. M., & Oler, M. J. (2018). Getting comfortable on audits:
111
Understanding firms’ usage of forensic specialists. Contemporary Accounting
Research, 35, 1766-1797. doi:10.1111/1911-3846.12359
Jiang, J., Aldewereld, H., Dignum, V., Wang, S., & Baida, Z. (2015). Regulatory
compliance of business processes. AI & Society, 30, 393-402.
doi:10.1007/S00146-014-0536-9
Johanson, E., & Carey, P. (2016). Detecting fraud: The role of the anonymous reporting
channel. Journal of Business Ethics, 139, 391-409. doi:10.1007/s10551-015-2673-
6
Joslin, R., & Müller, R. (2016). Identifying interesting project phenomena using
philosophical and methodological triangulation. International Journal of Project
Management, 34, 1043-1056. doi:10.1016/j.ijproman.2016.05.005
Kaczynski, D., Salmona, M., & Smith, T. (2014). Qualitative research in finance.
Australian Journal of Management, 39, 127-135.
doi:10.1177%2F0312896212469611
Kaplan, S. E., Pope, K. R., & Samuels, J. A. (2015). An Examination of the effects of
managerial procedural safeguards, managerial likeability, and type of fraudulent
act on intentions to report fraud to a manager. Behavioral Research in
Accounting, 27(2), 77-94. doi:10.2308/bria-51126
Karcz, M., & Papadakos, P. J. (2011). The consequences of fraud and deceit in medical
research. Canadian Journal of Respiratory Therapy, 47(1), 18-27. Retrieved from
https://search.proquest.com/
Kassem, R. & Higson, A. (2012). The new fraud triangle model. Journal of Emerging
112
Trends in Economics and Management Sciences. (JETEMS), 3, 191-195.
Retrieved from https://hdl.handle.net/
Khan, S. (2014). Qualitative research method: Grounded theory. International Journal of
Business and Management, 9, 224-233. doi:10.5539/ijbm.v9n11p224
Kioko, S. N., & Zhang, P. (2019). Impact of tax and expenditure limits on local
government use of tax-supported debt. Public Finance Review, 47, 409-432.
doi:10.1177/1091142117723706
Komarova-Loureiro, Y., Bayuk, J., Tignor, S. M., Nenkov, G. Y., Baskentli, S., & Webb,
D. (2016). The case for moral consumption: Examining and expanding the
domain of moral behavior to promote individual and collective well-being.
Journal of Public Policy & Marketing, 35, 305-322. doi:10.1509%2Fjppm.15.148
Kotsanopoulos, K. V., & Arvanitoyannis, I. S. (2017). The role of auditing, food safety,
and food quality standards in the food industry: A review. Comprehensive
Reviews in Food Science and Food Safety, 16, 760-775. doi:10.1111/1541-
4337.12293
Krause, J. H. (2016). Ethical lawyering in the gray areas: Health care fraud and abuse.
The Ethical Health Lawyer, 34, 121-125. doi:10.1111/j.1748-720X.2006.00016.x
Kruth, J. G. (2015). Five qualitative research approaches and their applications in
parapsychology. The Journal of Parapsychology, 79, 219-233. Retrieved from
https://www.psycnet.apa.org/
Kummer, T. F., Singh, K., & Best, P. (2015). The effectiveness of fraud detection
instruments in not-for-profit organizations. Managerial Auditing Journal, 30,
113
435-455. doi:10.1108/MAJ-08-2014-1083
Lawrence, J., & Tar, U. (2013). The use of grounded theory technique as a practical tool
for qualitative data collection and analysis. Journal of Business Research
Methods, 11(1), 29-40. Retrieved from https:// www.ejbrm.com
Lee, Y. S. (2018). Government guaranteed small business loans and regional growth.
Journal of Business Venturing, 33(1), 70-88. doi:10.1016/j.jbusvent.2017.11.001
Leitner, S. & Wall, F. (2015). Simulation-based research in management accounting and
control: An illustrative overview. Journal of Management Control, 6, 105–129.
doi:10.1007/s00187-015-0209-y
Lenz, P. J., & Graycar, A. (2016). Stealing from the boss: who is looking? Journal of
Financial Crime, 23, 613-623. doi:10.1108/JFC-09-2015-0053
LeRoux, C. S. (2017). Exploring rigor in autoethnographic research. International
Journal of Social Research Methodology, 20, 195-2017.
doi:10.1080/13645579.2016.1140965
Lewis, S. (2015). Qualitative inquiry and research design: Choosing among five
approaches. Health Promotion Practice, 16, 473-475.
doi:10.1177/1524839915580941
Li, H., Dai, J., Gershberg, T., & Vasarhelyi, M. A. (2018). Understanding usage and
value of audit analytics for internal auditors: An organizational approach.
International Journal of Accounting Information Systems, 28, 59-76.
doi:10.1016/j.accinf.2017.12.005
Locke, L. F., Spirduso, W. W., & Silverman, S. J. (2016). Proposals that work. A guide
114
for planning dissertations and grant proposals. (6th ed.). Washington, DC. Sage
Publications Inc.
Lokanan, M. E. (2015) Challenges to the fraud triangle: Questions on its usefulness.
Accounting Forum, 39, 201–224. doi:10.1016/j.accfor.2015.05.002
Lub, V. (2015). Validity in qualitative evaluation: Linking purposes, paradigms, and
perspectives. International Journal of Qualitative Methods, 8(5), 1-14.
doi:10.1177/1609406915621406
Lueg, R., & Radlach, R. (2016). Managing sustainable development with management
control systems: A literature review. European Management Journal, 34, 158-
171. doi:10.1016/j.emj.2015.11.005
MacLennan, H. L., Piña, A. A., Hafford, P. F., & Moran, K. A. (2016). A viable
credential for faculty in programmatically accredited business degree programs.
International Journal of Doctoral Studies, 11, 217-226. doi:10.28945/3529
Madura, J. (2015). International financial management (12th ed.). Stamford, CT:
Cengage Learning.
Makrakis, V., & Kostoulas-Makrakis, N. (2015). Bridging the qualitative-quantitative
divide: Experiences from conducting a mixed methods evaluation in the RUCAS
program. Evaluation and Program Planning, 54, 141-154.
doi:10.1016/j.evalprogplan.2015.07.008
Mansor, N. (2015). Concomitant debacle of fraud incidences in the Nigerian public
sector: Understanding the power of fraud triangle theory. International Journal of
Academic Research in Business and Social Sciences, 5, 2222-6990.
115
doi:10.6007/IJARBSS/v5-i5/1641
Marshall, C., & Rossman, G. B. (2016). Designing qualitative research (6th ed.).
Thousand Oaks, CA: Sage Publications.
Masegare, P., & Ngoepe, M. (2018). A framework for incorporating implementation
indicators of corporate governance for municipalities in South Africa. Corporate
Governance: The International Journal of Business in Society, 18, 581-593.
doi:10.1108/CG-11-2016-0216
Mathenge, G.D. (2014). An empirical study to measuring corruption and integrity in
Kenyan police agency: An ethical perspective. Public Policy and Administration
Research, 4(2), 67-79. Retrieved from https://www.iiste.org/
Mayer, J.D. (2015). The personality systems framework: Current theory and
development. The Journal of Research in Personality, 56, 4-14.
doi:10.1016/j.jrp.2015.01.001
McClelland, M. M., & Cameron, C. E. (2019). Developing together: The role of
executive function and motor skills in children’s early academic lives. Early
Childhood Research Quarterly, 46, 142-151. doi:10.1016/j.ecresq.2018.03.014
McDonnell, D., & Rutherford, A. C. (2018). The determinants of charity misconduct.
Nonprofit and Voluntary Sector Quarterly, 47, 107-125.
doi:10.1177%2F0899764017728367
McKim, C. A. (2017). The value of mixed methods research: A mixed-methods study.
Journal of Mixed Methods Research, 11, 202-222.
doi:10.1177/1558689815607096
116
Mlambo, D. N., Mubecua, M. A., Mpanza, S. E., & Mlambo, V. H. (2019). Corruption
and its implications for development and good governance: A perspective from
post-colonial Africa. Journal of Economics and Behavioral Studies, 11(1), 39-47.
doi:10.22610/jebs.v11i1(J).2746
Moore Jr, B. (2016). Injustice: The social bases of obedience and revolt (1st ed.).
Routledge, NY: Taylor & Francis.
Morales, J., Gendron, Y., & Guénin-Paracini, H. (2014). The construction of the risky
individual and vigilant organization: A genealogy of the fraud triangle.
Accounting, Organizations and Society, 39, 170-194.
doi:10.1016/j.aos.2014.01.006
Morse, J.M. (2015). Critical analysis of strategies for determining rigor in qualitative
inquiry. Qualitative Health Research, 25, 1212-1222.
doi:10.1177/1049732315588501 Mukherjee, A. S. (2016). Why we’re seeing so
many corporate scandals. Harvard Business Digital Articles, 2-4. Retrieved from
https://www.hbr.org
Muhtar, M., Sutaryo, S., & Sriyanto, S. (2018). Corruption in Indonesian local
Government: Study on triangle fraud theory. International Journal of Business
and Society, 19, 536-552. Retrieved from https://www.researchgate.net/
Murphy, M. L. (2015). Preventing and detecting fraud at not-for-profits: Environment,
policies, and controls can help organizations steer clear of problems. Sponsored
Report, Journal of Accountancy, 220(6), 77-85. Retrieved from
https://www.journalofaccountancy.com/
117
Murphy, P. R., & Dacin, M. T. (2011). Psychological pathways to fraud: Understanding
and preventing fraud in organizations. Journal of Business Ethics, 101, 601- 618.
doi:10.1007/s10551-011-0741-0
Nanduri, J., Jia, Y., Oka, A., Beaver, J., & Liu, Y. W. (2020). Microsoft uses machine
learning and optimization to reduce E-Commerce fraud. INFORMS Journal on
Applied Analytics, 50(1), 64-79. doi:10.1287/inte.2019.1017
National Association for State Community Action Programs. (2014). Report to the states
on the community services block grant. Retrieved from
http://www.nascsp.org/data/files/csbg_publications/annual_reports/textonly_2014
Ndofor, H. A., Wesley, C., & Priem, R. L. (2015). Providing CEOs with opportunities to
cheat the effects of complexity-based information asymmetries on financial
reporting fraud. Journal of Management, 41, 1774-1797.
doi:10.1177/0149206312471395
Nelissen, J., Forrier, A., & Verbruggen, M. (2017). Employee development and voluntary
turnover: Testing the employability paradox. Human Resource Management
Journal, 27, 152-168. doi:10.1111/1748/8583.12136
Neu, D., Everett, J., & Rahaman, A. (2013). Internal auditing and corruption within
government: The case of the Canadian sponsorship program. Contemporary
Accounting Research, 30, 1223-1250. doi:10.1111/j.1911-3846.2012.01195.x
N’Guilla-Sow, A., Basiruddin, R., Abdul-Rasid, S. Z., & Husin, M. M. (2018).
Understanding fraud in Malaysian SMEs. Journal of Financial Crime, 25, 870-
881. doi:10.1108/JFC-08-2017-0077
118
Nigrini, M. J. (2019). The patterns of the numbers used in occupational fraud schemes.
Managerial Auditing Journal, 34, 602-622. doi:10.1108/MAJ-11-2017-1717
Noble, H., & Smith, J. (2015). Issues of validity and reliability in qualitative research.
Evidence-Based Nursing, 18(2), 34-35. doi:10.1136/eb-2015-102054
Nuscheler, D., Engelen, A., & Zahra, S. A. (2019). The role of top management teams in
transforming technology-based new ventures’ product introductions into
growth. Journal of Business Venturing, 34, 122-140.
doi:10.1016/j.jbusvent.2018.05.009
Oishi, S., Kushlev, K., & Schimmack, U. (2018). Progressive taxation, income inequality,
and happiness. American Psychologist, 73, 157-168. doi:10.1037/amp0000166
O’Keeffe, J. O., Buytaert, W., Mijic, A., Brozovic, N., & Sinha, R. (2015). The use of
semi-structured interviews for the characterization of farmer irrigation practices.
Hydrology and Earth System Sciences Discussions, 12, 8221-8246.
doi:10.5194/hessd-12-8221-2015
Okoe, A. F., & Boateng, H. (2015). Two-way communication on bank websites in
Ghana: A data triangulation approach. Information Development, 32, 1471-1484.
doi:10.1177/0266666915605556
Okpeyo, E. T., Musah, A., & Gakpetor, E. D. (2019). Determinants of tax compliance in
Ghana. Journal of Applied Accounting and Taxation, 4(1), 1-14.
doi:10.30871/jaat.V4i1.935
Omair, B., & Alturki, A. (2020). Taxonomy of fraud detection metrics for business
processes. IEEE Access, 8, 71364-71377. doi:10.1109/ACCESS.2020.2987337
119
Palinkas, L.A., Horwitz, S.M., Green, C.A., Wisdom, J.P., Duan, N., & Hoagwood, K.
(2013). Purposeful sampling for qualitative data collection and analysis in mixed
method implementation research. Administration and Policy in Mental Health, 42,
533-544. doi:10.1007/s10488-013-0528-y
Pamela, R., Murphy, P. R., & Free, C. (2016). Broadening the fraud triangle:
Instrumental climate and fraud. Behavioral Research in Accounting. American
Accounting Association, 28(1), 41-56. doi:10.2308/bria-51083
Parker, L. (2014). Qualitative perspectives: Through a methodological lens. Qualitative
Research in Accounting & Management, 11(1), 1-17. doi:10.1108/QRAM-02-
2014-0013
Parmar, B. L., Keevil, A., & Wicks, A. C. (2019). People and profits: The impact of
corporate objectives on employees’ need satisfaction at work. Journal of Business
Ethics, 154(1), 13-33. doi:10.1007/s10551-017-3487-5
Paschen, J, A., & Ison, R. (2014). Narrative research in climate change adaptation-
Exploring a complementary paradigm for research and governance. Research
Policy, 43, 1083-1092. doi:10.1016/j.respol.2013.12.006
Paté-Cornell, M. E., Kuypers, M., Smith, M., & Keller, P. (2018). Cyber risk
management for critical infrastructure: A risk analysis model and three case
studies. Risk Analysis, 38, 226-241. doi:10.1111/risa.12844
Patterson, A. S., & Kuperus, T. (2016). Mobilizing the faithful: Organizational
autonomy, visionary pastors, citizenship in South Africa and Zambia. African
Affairs, 115, 318-341. doi:10.1093/afraf/adw003
120
Patton, M. Q. (2015). Qualitative research & evaluation methods: Integrating theory and
practice (4th ed.). Thousand Oaks, CA: Sage.
Peltier-Rivest, D. (2017). The prevention and detection of corruption in pharmaceutical
companies. Pharmaceuticals Policy & Law, 19(1), 17-31. doi:10.3233/PPL-
170451
Peng, S., Liao, Y., & Sun, R. (2020). The influence of transformational leadership on
employees’ affective organizational commitment in public and nonprofit
organizations: A moderated mediation model. Public Personnel
Management, 49(1), 29-56. doi:10.1177%2F0091026019835233
Permana, B. A., Perdana, H. D., & Kurniasih, L. (2017). Determinant of fraud in a
government agency: Empirical study at the finance and development supervisory
agency (BPKP) of Jakarta representative office. Asia Pacific Fraud Journal, 2(1),
93-108. doi:10.21532/apfj.001.17.02.01.08
Pollman, E. (2020). Private Company Lies. Georgetown Law Journal, 109, 20-19.
Retrieved from https://ssrn.com/abstract=3551565
Power, M. (2013). The apparatus of fraud risk. Accounting, Organizations, and Society,
38, 535–543. doi:10.1016/j.aos.2012.07.004
Prescott, G. L., & Vann, C. E. (2018). Implications of clawback adoption in executive
compensation contracts: A survey of recent research. Journal of Corporate
Accounting & Finance, 29(1), 59-68. doi:10.1002/jcaf.22312
Purda, L., & Skillicorn, D. (2015). Accounting variables, deception, and a bag of words:
Assessing the tools of fraud detection. Contemporary Accounting Research, 32,
121
1193–1223. doi:10.1111/1911-3846.12089
PWC. (2014). Economic crime: A threat to business processes. Retrieved from
http://www.pwc.com/
Rasha, K., & Andrew, H. (2012). The new fraud triangle: Journal of emerging. Trends in
Economics and Management Sciences, 3, 191-195. https://www.hdl.handle.net/
Raghavan, R. (2018). Cyber insurance: A risk mitigation tool for cyber risk in
India. Bimaquest, 18(1), 25-83. Retrieved from
http://www.bimaquest.niapune.org.
Raval, V. (2018). A disposition-based fraud model: Theoretical integration and research
agenda. Journal of Business Ethics, 150, 741-763. doi:10.1007/s10551-016-3199
Rendon, R. G., & Rendon, J. M. (2015). Auditability in public procurement: An analysis
of internal controls and fraud vulnerability. International Journal of Procurement
Management, 8, 710-730. doi:10.1504/IJPM.2015.072388
Richards, L. (2015). Handling qualitative data: A practical guide (3rd ed.). Los Angeles,
CA: Sage.
Rieppel, L. (2018). Hoaxes, humbugs, and frauds: Distinguishing truth from untruth in
early America. Journal of the Early Republic, 38, 501-529.
doi:10.1353/jer.2018.0049
Robson, C., & McCartan, K. (2016). Real-world research (4th ed.). Chichester, West
Sussex, UK: John Wiley & Sons Ltd.
Roden, D. M., Cox, S. R., & Kim, J. Y. (2016) The fraud triangle as a predictor of
corporate fraud. Academy of Accounting and Financial Studies Journal, 20 (1),
122
80-98. Retrieved from https://www.researchgate.net/
Rogers, L. Q., Courneya, K.S., Anton, P. M., Hopkins-Price, P., Verhulst, S., Vicari, S.
K.,…& McAuley, E. (2015). Effects of the BEAT cancer physical activity
behavior change intervention on physical activity, aerobic fitness, and quality of
life in breast cancer survivors: A multicenter randomized controlled trial. Breast
Cancer Research and Treatment, 149, 109-119. doi:10.1007/s10549-014-3216-z
Rossouw, G. J. (2000). Defining and understanding fraud: A South African case study.
Business Ethics Quarterly, 10, 885-895. doi:10.2307/3857837
Roychowdhury, S., & Srinivasan, S. (2019). The role of gatekeepers in capital markets.
Journal of Accounting Research, 57, 295-322. doi:10.1111/1475-679X.12266
Said, J., Alam, M.M., Ramli, M., & Rafidi, M. (2017). Integrating ethical values into
fraud triangle theory in assessing employee fraud: Evidence from the Malaysian
banking industry. Journal of International Studies, 10, 170-184.
doi:10.14254/2071-8330.2017/10-2/13
Saldana, J. (2016). The coding manual for qualitative researchers (3rd ed.). Thousand
Oaks, CA: Sage Publications, Inc.
Salem, M. S. M. (2012). An overview of research on auditor’s responsibility to detect
fraud on financial statements. The Journal of Global Business Management, 8,
212-230. Retrieved from http://www.jgbm.org/
Sarah, P. (2016). Radical innovation of a business model: Is business modeling a key to
understand the essence of doing business? Competitive Review, 26, 132-146.
doi:10.1108/CR-06-2015-0061
123
Saha, R., Cerchione, R., Singh, R., & Dahiya, R. (2020). Effect of ethical leadership and
corporate social responsibility on firm performance: A systematic
review. Corporate Social Responsibility and Environmental Management, 27(2),
409-429. doi:10.1002/csr.1824
Saunders, B., Sim, J., Kingstone, T., Baker, S., Waterfield, J., Bartlam, B., ... & Jinks, C.
(2018). Saturation in qualitative research: Exploring its conceptualization and
operationalization. Quality & quantity, 52, 1893-1907. doi:10.1107/S11135-017-
0574-8
Schonert-Reichl, K. A., Oberle, E., Lawlor, M. S., Abbott, D., Thomson, K., Oberlander,
T. F., & Diamond, A. (2015). Enhancing cognitive and social-emotional
development through a simple-to-administer mindfulness-based school program
for elementary school children: A randomized controlled trial. Developmental
Psychology, 51(1), 52-66. doi:10.1037/a0038454
Schuchter, A., & Levi, M. (2016). The fraud triangle revisited. Security Journal, 29, 107-
121. doi:10.1057/sj.2013.1
Sebastiano, A., Belvedere, V., Grando, A., & Giangreco, A. (2017). The effect of
capacity management strategies on employees’ well-being: A quantitative
investigation into the long-term healthcare industry. European Management
Journal, 35, 563-573. doi:10.1016/j.emj.2016.12.001
Senden, C., Vandecasteele, T., Vandenberghe, E., Versluys, K., Piers, R., Grypdonck,
M., & Van Den Noortgate, N. (2015). The interaction between lived experiences
of older patients and their family caregivers confronted with a cancer diagnosis
124
and treatment: A qualitative study. International Journal of Nursing Studies,
52,197-206. doi:10.1016/j.ijnurstu.2014.07.012
Sharma, A., & Panigrahi, P. K. (2012). A Review of financial accounting fraud detection
based on data mining techniques. International Journal of Computer
Applications, 39, 1394-1405. doi:10.5120/4787-7016
Sibanda, M. M., Zindi, B., & Maramura, T. C. (2020). Control and accountability in
supply chain management: Evidence from a South African metropolitan
municipality. Cogent Business & Management, 7(1), 1785105.
doi:10.1080/23311975.2020.1785105
Siliunas, A., Small, M. L., & Wallerstein, J. (2019). We can help, but there is so catch:
Nonprofit organizations and access to government-funded resources among the
poor. Journal of Organizational Ethnography, 8, 109-128. doi:10.1108/JOE-04-
2018-0018
Silverman, D. (2017). How was it for you? The interview society and the irresistible rise
of the (poorly analyzed) interview. Qualitative Research, 17, 144-158.
doi:10.1177/1468794116668231
Simon, M. K., & Goes, J. (2013). Assumptions, Limitations, Delimitations, and Scope of
the Study. (Dissertation and Scholarly Research). Retrieved from
http://www.dissertationrecipes.com
Soleymani, M. H., Yaseri, M., Farzadfar, F., Mohammadpour, A., Sharifi, F., & Kabir,
M. J. (2018). Detecting medical prescriptions suspected of fraud using an
unsupervised data mining algorithm. Journal of Pharmaceutical Sciences, 26,
125
209-214. doi:10.1007/s40199-018-0227-z
Soltani, B. (2014). The anatomy of corporate fraud: A comparative analysis of high
profile American and European corporate scandals. Journal of Business Ethics,
120, 251-274. doi:10.1007/s10551-013-1660-z
Sorunke, O. A. (2016). Internal audit and fraud control in public institutions in Nigeria: A
survey of local government councils in Osun State. International Journal of
Academic Research in Business and Social Sciences, 6, 153-158.
doi:10.6007/IJARBSS/v6-i2/2019
Soviany, C. (2018). The benefits of using artificial intelligence in payment fraud
detection: A case study. Journal of Payments Strategy & Systems, 12, 102-110.
Retrieved from https://www.ingentaconnect.com/content/hsp/jpss/2018/
Sridharan, U. V. & Hadley, L. U. (2018) Internal audit, fraud and risk management at
Wells Fargo. International Journal of the Academic Business World, 12(1), 3-41.
Retrieved from https://www.jwpress.com
Stenfors-Hayes, T., Hult, H., & Dahlgren, M. A. (2013). A phenomenographic approach
to research in medical education. Medical Education Journal, 47, 261-270.
doi:10.111/medu.12101
Stephens, J., & Flaherty, M. P. (2013). Inside the hidden world of thefts, scams, and
phantom purchases at the nation’s nonprofits. Retrieved from
http://www.washingtonpost.com
Suen, L. W., Huang, H., & Lee, H. (2014). A comparison of convenience sampling and
purposive sampling. Huli Zazhi, 61, 105-111. doi:106224/JN.61.3.105
126
Sun, R., & Wang, W. (2016). Transformational leadership, employee turnover intention,
and actual voluntary turnover in public organizations. Public Management
Review, 19(8), 1-18. doi:10.1080/14719037.2016.1257063
Suryandari, N. N. A., Yuesti, A., & Suryawan, I. M. (2019). Fraud risk and earnings
Management. Journal of Management, 7(1), 43-51. doi:10.15640/jmpp.v7n1a4
Susanto, A. (2017). How Accounting information systems quality influenced by internal
control. Journal of Engineering and Applied Sciences, 12, 3147-3151.
doi:10.36478/jeasci.2017.3147.3151
Svatos, O. (2017). Requirements for business process legal compliance monitoring.
Journal of Systems Integration (1804-2724), 8(2), 3-13. doi:10.20470/jsi.v8i2.30
Svensson, P. G., & Moorman, A. M. (2019). Cross-border regulations: Exploring legal
considerations in the United States of nonprofit sport organizations engaged in
international charitable work. Journal of Legal Aspects of Sport, 29,118-138.
doi:10.18060/22897
Tam, N. D. (2016). Emotion-III model: A theoretical framework for social empathic
emotions in autonomous control systems. The Open Cybernetics & Systemics
Journal, 10, 132-146. doi:10.2174/1874110X01610010132
Taminiau, Y., Heusinkveld, S., & Cramer, L. (2019). Colonization contests: How both
accounting and law firms gain legitimacy in the market for forensic accounting.
Journal of Professions and Organization, 6(1), 49-71. doi:10.1093/jpo/joz001
Taylor, S. J., Bogdan, R., & DeVault, M. L. (2016). Introduction to qualitative research
methods (4th ed.). Hoboken, NJ: John Wiley & Sons Ltd.
127
Tefera, B. (2018). Early childhood care and education (ECCE) in Ethiopia:
Developments, research, and implications. Eastern Africa Social Science
Research Review, 34, 171-206. doi:10.1353/eas.2018.0005
Teherani, A., Martimianakis, T., Stenfors-Hayes, T., Wadhwa, A., & Varpio, L. (2015).
Choosing a qualitative research approach. Journal of Graduate Education, 7, 669-
670. doi:10.4300/JGME-D-15-00414.1
Tepper, B. J., Simon, L., & Park, H. M. (2017). Abusive supervision. Annual Review of
Organizational Psychology and Organizational Behavior, 4, 123-152.
doi:10.1146/annurev-orgpsych-041015-062539
Tombs, S. (2017). Mitigating and responding to corporate violence: Beyond crime and
criminology. London: Palgrave Macmillan.
Treviño, L. K., den Nieuwenboer, N. A., & Kish-Gephart, J. J. (2014). (Un) ethical
behavior in organizations. Annual Review of Psychology, 65, 635-660.
doi:10.1146/annurev-psych-113011-143745
Trochim, W. M. (2006). Qualitative measures. Research measures knowledge base, 361,
2-16. Retrieved from https://pdfs.semanticscholar.org/
Tunley, M., Button, M., Shepherd, D., & Blackbourn, D. (2018). Preventing occupational
corruption: Utilizing situational crime prevention techniques and theory to
enhance organizational resilience. Security Journal, 31(1), 21-52.
doi:10.1057/s41284-016-0087-5
Ulrich, C. M., Wallen, G. R., Cui, N., Chittams, J., Sweet, M., & Plemmons, D. (2015).
Establishing good collaborative research practices in the responsible conduct of
128
nursing science. Nursing Outlook, 63, 171-180.
doi:10.1016/j.outlook.2014.10.007
Vadera, A. K., & Pratt, M. G. (2013). Love, hate, ambivalence, or indifference? A
conceptual examination of workplace crimes and organizational identification.
Organization Science, 24, 172-188. doi:10.1287/orsc.1110.0714.
Van Den-Berg, A., & Struwig, M. (2017). Guidelines for researchers using an adapted
consensual qualitative research approach in management research. Electronic
Journal of Business Research Methods, 15, 109-119. Retrieved from
https://www.ejbrm.com
Varpio, L., Ajjawi, R., Monrouxe, L. V., O’Brien, B. C., & Rees, C. E. (2017). Shedding
the cobra effect: Problematizing thematic emergence, triangulation, saturation,
and member checking. Medical Education, 51(1), 40-50.
doi:10.1111/medu.13124
Vasarhelyi, M. A., Kogan, A., & Tuttle, B. M. (2015). Big data in accounting: An
overview. Accounting Horizons, 29, 381-396. doi:10.2308/acch-51071
Vaughn, P., & Turner, C. (2016). Decoding via coding: Analyzing qualitative text data
through thematic coding and survey methodologies. Journal of Library
Administration, 56(1), 41-51. doi:10.1080/01930826.2015.1105035
Walden University. (2016). D.B.A. doctoral study process and document: Center for
research quality. Retrieved from http://www.researchcenter.waldenu.edu/
Warren, D. E., & Schweitzer, M. E. (2018). When lying does not pay: How experts detect
insurance fraud. Journal of Business Ethics, 150, 711-726. doi:10.1007/s10551-
129
016-3124-8
Williams, T. (2018). Role of management, corporate governance, and Sarbanes-Oxley in
fraud: A focus on the precious metals industry. Sustainability and Social
Responsibility: Regulation and Reporting, 1, 391-409. doi:10.1007/978-981-10-
4502-8_16
Wilson, V. (2014). Research methods: Triangulation. Evidence-based Library andI
information Practice, 9(1), 74-75. doi:10.18438/B8WW3X
Winchester, C.L., & Salji, M. (2016). Writing a literature review. Journal of Clinical
Urology, 9, 308-312. doi:10.1177/2051415816650133
Wu, W., Rafiq, M., & Chin, T. (2017). Employee well-being and turnover intention.
Career Development International, 22, 797-815. doi:10.1108/CDI-04-2017-0072
Yaakobi, E., & Weisberg, J. (2018). Individual, group, and organizational efficacies in
predicting performance. Personnel Review, 47, 535-554. doi:10.1108/PR-08-
2016-0212
Yadav, L. K. (2016). Employee engagement among academicians: Interaction effect of
perceived organizational support and individualism. Vilakshan: The XIMB
Journal of Management, 13(1), 21-38. Retrieved from https://www.academia.edu
Yazan, B. (2015). Three approaches to case study methods in education: Yin, Merriam,
and Stake. Qualitative Report, 20, 134-152. Retrieved from
http://www.nsuworks.nova.edu/tqr
Yazdani, N. & Murad, H. S. (2015). Toward an ethical theory of organizing. Journal of
Business Ethics, 127, 399- 417. doi:10.1007/s10551-014-2049-3
130
Yee, C. S., Sujan, A., James, K., & Leung, J. K. (2017). Perceptions of Singaporean
internal audit customers regarding the role and effectiveness of internal audit.
AJBA, 1, 147-174. Retrieved from https://ajba.um.edu/
Yeh, R., & Chen, T. (2019). US leadership in scholarship and higher education: The
implications for hospitality management educators. Business and Public
Administration Studies, 13(1), 42-50. Retrieved from https:// www.bpastudies.org
Yin, R. K. (2017). Case study research and applications: Design and methods (6th ed.).
Thousand Oaks, CA: Sage.
Zack, G., & DeArmond, L. (2015). Nonprofit fraud: It’s a people problem. So combat it
with governance. Retrieved from https://www.washingtonpost.com Zamawe, F.
C. (2015). The implications of using NVivo software in qualitative data analysis:
Evidence-based reflections. Malawi Medical Journal, 27(1), 13-15.
doi:10.4314/mmj.v2711.4
Zerban, A. M. (2018). Enron of Saudi Arabia: Corporate accounting and auditing
failures. Journal of Accounting, 7(1), 1-18. Retrieved from
https://www.researchgate.net/publication/322179395
Zhang, J. (2018). Public governance and corporate fraud: Evidence from the recent anti-
corruption campaign in China. Journal of Business Ethics, 148, 375-396.
doi:10.1007/s10551-016-3025-x
Zhuk, O. (2018). Tax control in the system of tax administration. Journal of Vasyl
Stefanyk Precarpathian National University, 5(3), 57-61. doi:10.15330/jpnu.5.3-
4.56-61
131
Zona, F., Minoja, M., & Coda, V. (2013). Antecedents of corporate scandals. CEOs”
personal traits, stakeholder’s cohesion, managerial fraud, and imbalanced
corporate strategy. Journal of Business Ethics, 113, 265-283. doi:10.1007/s10551-
012-1294-6
132
Appendix A: Interview Protocol
1. I will introduce myself to participants
2. I will recap the purpose of the study, answer any questions, and make sure that
each participant signed the consent form.
3. I will record the interview with an audio recorder.
4. I will transcribe the interview (Verbatim) as a second support.
5. I will create a summary of each interview.
6. I will discuss member-checking with participants to confirm the accuracy of the
interview.
133
Appendix B: Interview Questions
1. What strategies have you used to reduce fraudulent financial activities in your
organization?
2. How do you determine if your strategies used to reduce fraudulent financial
activities are working?
3. What strategies were the least effective to reduce fraudulent financial activities?
4. What, if any, strategies do you use to circumvent the pressure to commit a crime in
your organization?
5. What, if any, strategies do you use to circumvent the opportunity to commit a
crime in your organization?
6. What, if any, strategies do you use to circumvent the rationalization to commit a
crime in your organization?
7. What other information can you add about your strategies to reduce fraudulent
financial activities?